One way to run malware on the iPhone even when it is off has been discovered

This is a terrible lie. When you believe you have locked your iPhone, there is a way to tamper with the firmware. Researchers discovered a weakness in an unprecedented security test of iOS Find My Feature. Malware can run on the iPhone even when it is off. This new groundbreaking feature allows the use of specific components in the iPhone that continue to work even after you turn off iOS. These Bluetooth, Near-Field Communication (NFC), and ultra-sideband (UWB) wireless systems continue to work even in low power storage mode (LPM).

Since the release of iOS 15, we have been able to find a lost iPhone with Find Me even after charging the device. On the iPhone 11, iPhone 12, and iPhone 13 models, the UWB feature helps keep the device visible even if your iPhone or battery is dead. This also allows the iPhone’s Transit Express Mode to continue working, but Hacker Reports reports that researchers have found a problem with this. Students from the Center for Safe Mobile Networking at the University of Darmstadt conducted the threat in a recent study. They will be showcasing their findings at the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2022) this week in San Antonio.

Wireless Chips Have Direct Access to the Security Bag. Apple hardwires Bluetooth and UWB chips to Security Element in iPhone’s NFC chip, researchers find. This allows them to save “secrets that should be in LPM.” The researchers found that the Bluetooth firmware was unoccupied and did not delete content. This provides a loophole, they say, which gives the attacker access to the iPhone to give malware via Bluetooth even after charging the device. Since Apple implemented Low Power Mode at the application level, technology giants cannot replace it in iOS. Therefore, you cannot trust all your wireless chips to be turned off when you turn off your iPhone.

The only good news here is that such an attack will not be easy. The investigators told what kind of firmware deal to occur, the attack needed to find a way to communicate. They say that one way to do this is through the operating system (meaning while the iPhone is running). Attacks can also change the firmware image, requiring physical access to the iPhone. The third way would be to gain code execution on the LPM-enabled chip using a defect such as BrakTooth.

“Since LPM support is based on the iPhone application, it cannot be removed with system updates,” the researchers said. “Therefore, it has a long-term impact on the overall iOS security model.” The design of LPM features seems to be controlled by performance, without noticing the threats outside of the intended facilities. Find Me after turning off power Turn off iPhones into tracking devices by design, and implementation within the Bluetooth firmware is not protected against manipulation.

We will be happy to hear your thoughts

      Leave a Reply

      AppleiPhonestop - Apple iPhone News and Rumours All Day
      Enable registration in settings - general
      Compare items
      • Laptops (0)