Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

How to remotely infiltrate iPhone through iOS Trustjacking vulnerabilities

2025-02-24 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)05/31 Report--

This article shows you how to infiltrate iPhone remotely through iOS Trustjacking vulnerabilities. The content is concise and easy to understand, and it will definitely brighten your eyes. I hope you can get something through the detailed introduction of this article.

Symantec researchers have discovered a flaw in the pairing of iPhone with Mac workstations and laptops. They say attackers can exploit this vulnerability, known as Trustjacking, to take over the device without information.

The Trustjacking vulnerability stems from the "iTunes Wi-Fi synchronization" feature that comes with iTunes. If you enable this option in the iTunes Settings section, when a Mac laptop / workstation user synchronizes the new iPhone to his computer, the user can connect to the smartphone at any time through the local WiFi network without a data cable.

This feature is supposed to make it easy for users to retrieve or send data from their smartphones through the iTunes app and its API.

But Symantec researchers say its design is flawed. Even after the iPhone device is disconnected from the computer, the feature still allows computer users to access paired iPhone through the local WiFi network.

Attackers can control iPhone through local WiFi

Roy Iarchy, the head of Symantec, said attackers may abuse the iTunes Wi-Fi synchronization function to control the device, and the victim will not be prompted. Today's issue of RSA 2018, the researchers announced their findings.

Iarchy said that if a user enabled iTunes WiFi synchronization and paired with a malicious device, an attacker could use iTunes API to record the user's screen through repeated screenshots in a short period of time and send screenshots back to the iTunes application.

In addition, after a successful match, the attacker can install or delete the application without any user interaction, or even trigger a remote backup to send it to his computer.

Do you need a social worker?

Obviously, this attack cannot be achieved without social engineering, because iPhone users need to click on the pop-up window on his iPhone and agree to pair with the attacker's device.

But the reality is that if your Mac is infected with a virus, the virus can enable "iTunes WiFi synchronization" with an automatic script, and your previously paired iPhone can be attacked without having to verify it again.

And it is worth noting that attacks do not necessarily need to be carried out under a unified network, through VPN, local area network communication can also be carried out, and then data transmission.

Trustjacking patch is incomplete

Symantec said it informed Apple of the problem, but Apple's patch did not satisfy Symantec.

Apple's solution is to require iPhone users to enter their phone's password when pairing their computers. This repair prevents strangers from quickly pairing other people's phones with their laptops.

But Symantec said the patch did not address the problem that users would be able to get data from the device after being disconnected from the paired computer. Computers that were previously placed in trusted devices can still connect normally. Attackers can still use iTunes to quietly connect to the phone as long as they are within the scope of wifi. And Apple does not provide an entry to list all trusted computers, and there is no way for users to choose unfamiliar devices to revoke access.

"the way to clear trusted computers is to set up > General > reset > reset location and Privacy, and clear the list of trusted computers so that you need to verify again when you connect to any device again."

The above is how to remotely infiltrate iPhone through iOS Trustjacking vulnerabilities. Have you learned any knowledge or skills? If you want to learn more skills or enrich your knowledge reserve, you are welcome to follow the industry information channel.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report