iTnews Asia
  • Home
  • News
  • Security

Apple's 'Find My' feature created attack vector, researchers say

Apple's 'Find My' feature created attack vector, researchers say

Wireless chips are always on, even when the phone is ‘off’.

By Richard Chirgwin on May 18, 2022 10:00AM

The feature that lets Apple iPhone owners try to locate their stolen or lost devices can be exploited to run malware, a group of German researchers have found.

The findings were presented yesterday to the ACM’s WiSec 2022 conference by researchers Jiska Classen, Alexander Heinrich, Robert Reith and Matthias Hollick of TU Darmstat’s Secure Mobile Networking Lab.

In a paper posted to arXiv late last week, the researchers explained that to keep a phone locatable by the Find My network, most wireless chips remain active even if an iPhone is switched off.

As well as device location (implemented in Bluetooth), the researchers wrote that items in the phone’s digital wallet also remain accessible when a phone is switched off.

They analysed how these features are implemented, and what their security boundaries are.

What they found is that the iPhone’s power management system can power up the individual Bluetooth and ultra-wideband (UWB) chips, in a low power mode (LPM) they describe as “significantly more stealthy than a fake power off that only disables the screen”.

“LPM is a relevant attack surface that has to be considered by high-value targets such as journalists, or that can be weaponised to build wireless malware operating on shutdown iPhones”, the researchers wrote.

“On recent iPhones, Bluetooth, near field communication (NFC), and ultra-wideband keep running after power off, and all three wireless chips have direct access to the secure element," the paper states.

Since those chips are hardwired to the secure element, they have access to secrets stored there – an implementation vulnerability can’t be fixed with a software patch.

“As a result, on modern iPhones, wireless chips can no longer be trusted to be turned off after shutdown”.

The researchers also found that there’s no mechanism for signing the firmware the Bluetooth processor runs, creating a potential exploit vector.

The researchers posted a video teaser of their presentation on YouTube.

To reach the editorial team on your feedback, story ideas and pitches, contact them here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
apple bluetooth cyber security find my iphone security wifi

Related Articles

  • Beware the pitfalls of using a ‘DIY security’ approach
  • AI transforms cyberattacks, but human trust remains the weakest link
  • How severe will ransomware attacks become in 2026?
  • Identity is now the new cybersecurity battlefield
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Beware the pitfalls of using a ‘DIY security’ approach

Beware the pitfalls of using a ‘DIY security’ approach

AI transforms cyberattacks, but human trust remains the weakest link

AI transforms cyberattacks, but human trust remains the weakest link

Zuellig Pharma launches Asia's first healthcare data exchange platform

Zuellig Pharma launches Asia's first healthcare data exchange platform

Toyota's Indian unit warns of a possible customer data breach

Toyota's Indian unit warns of a possible customer data breach

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of Lighthouse Independent Media's Privacy Policy and Terms & Conditions.