iTnews Asia
  • Home
  • News
  • Security

Apple's 'Find My' feature created attack vector, researchers say

Apple's 'Find My' feature created attack vector, researchers say

Wireless chips are always on, even when the phone is ‘off’.

By Richard Chirgwin on May 18, 2022 10:00AM

The feature that lets Apple iPhone owners try to locate their stolen or lost devices can be exploited to run malware, a group of German researchers have found.

The findings were presented yesterday to the ACM’s WiSec 2022 conference by researchers Jiska Classen, Alexander Heinrich, Robert Reith and Matthias Hollick of TU Darmstat’s Secure Mobile Networking Lab.

In a paper posted to arXiv late last week, the researchers explained that to keep a phone locatable by the Find My network, most wireless chips remain active even if an iPhone is switched off.

As well as device location (implemented in Bluetooth), the researchers wrote that items in the phone’s digital wallet also remain accessible when a phone is switched off.

They analysed how these features are implemented, and what their security boundaries are.

What they found is that the iPhone’s power management system can power up the individual Bluetooth and ultra-wideband (UWB) chips, in a low power mode (LPM) they describe as “significantly more stealthy than a fake power off that only disables the screen”.

“LPM is a relevant attack surface that has to be considered by high-value targets such as journalists, or that can be weaponised to build wireless malware operating on shutdown iPhones”, the researchers wrote.

“On recent iPhones, Bluetooth, near field communication (NFC), and ultra-wideband keep running after power off, and all three wireless chips have direct access to the secure element," the paper states.

Since those chips are hardwired to the secure element, they have access to secrets stored there – an implementation vulnerability can’t be fixed with a software patch.

“As a result, on modern iPhones, wireless chips can no longer be trusted to be turned off after shutdown”.

The researchers also found that there’s no mechanism for signing the firmware the Bluetooth processor runs, creating a potential exploit vector.

The researchers posted a video teaser of their presentation on YouTube.

To reach the editorial team on your feedback, story ideas and pitches, contact them here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
apple bluetooth cyber security find my iphone security wifi

Related Articles

  • Identity is now the new cybersecurity battlefield
  • Why APAC organisations must rethink their cloud and AI security
  • Why is fragmentation the next big cybersecurity risk?
  • The maritime sector is now in the crosshairs of cybercriminals
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Why APAC organisations must rethink their cloud and AI security

Why APAC organisations must rethink their cloud and AI security

Identity is now the new cybersecurity battlefield

Identity is now the new cybersecurity battlefield

Why is fragmentation the next big cybersecurity risk?

Why is fragmentation the next big cybersecurity risk?

Malaysia's Maxis Berhad investigates claims on alleged data breach

Malaysia's Maxis Berhad investigates claims on alleged data breach

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of Lighthouse Independent Media's Privacy Policy and Terms & Conditions.