Wikinews interviews Secure Mobile Networking Lab about iPhone vulnerability in low power mode

Thursday, June 2, 2022

You can add an infobox from Category:Infoboxes.

On 12 May 2022, Secure Mobile Networking Lab, TU Darmstadt, Germany published a report of vulnerability in a jailbroken iPhone that allows an attacker to gain control over the device when it is seemingly off. In what is known as low-power mode, some chips of the device continue to run, with the benign intent of supplying users with some limited functionality, such as finding their device and some types of contactless keys.

The low-power mode involves supplying power to the Bluetooth chip, and the researchers showed how this could be misused to add malware to the device. This malware would operate in the low-power mode without switching on the device. The reporters noted jailbroken devices were not common, and majority of consumers did not jailbreak their phones. Furthermore, the researchers pointed out that this attack vector needed more research to evaluate the risk of writing more sophisticated malware that can attack non-jailbroken devices.

Researchers published their modified Broadcom firmware at InternalBlue and Frankenstein repositories.

[edit]

Retrieved from “https://en.wikinews.org/w/index.php?title=Wikinews_interviews_Secure_Mobile_Networking_Lab_about_iPhone_vulnerability_in_low_power_mode&oldid=4679508”