Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

iOS 9 Resolves Hijacking via AirDrop Vulnerability

iOS 9, the operating system that Apple is making available for download today to its mobile device users, comes with more than new usability and functionality features. It also resolves a vulnerability that can be exploited over Apple’s over-the-air file sharing technology, AirDrop.

iOS 9, the operating system that Apple is making available for download today to its mobile device users, comes with more than new usability and functionality features. It also resolves a vulnerability that can be exploited over Apple’s over-the-air file sharing technology, AirDrop.

Discovered by Australian researcher Mark Dowd, the vulnerability affects all devices running on iOS 7 or later and can be exploited to hijack iPhones to run malicious code on them. An attacker could exploit the security flaw when in Bluetooth range of an affected device either to install malware of for lock-screen bypass, Dowd says.

The researcher published a proof-of-concept video showing that the exploit works even if the owner of the iPhone rejects the incoming AirDrop file and says that Mac OS X Yosemite and later versions are vulnerable to the attack as well.

According to Dowd, an attacker could carry out a directory traversal attack to exploit AirDrop and modify the configuration files so that the iOS device would accept any application that features an Apple enterprise certificate. Such certificates are issued only to legitimate developers, but cybercriminals often trade them on the black market, which prompted Apple to update the app sideloading process in iOS 9.

Dowd used the AirDrop flaw to install a provisioning profile for his app and altered Springboard, the program that manages the iOS homescreen, so that the phone would see it as coming from a trusted developer, thus skipping the pop up that appears when an application coming from a new developer is run for the first time, Forbes explains.

Dowd copied malware files into the directory when third-party apps are located and modified the iOS Springboard (home screen) so that his application would replace the default Phone program in iOS. When carrying out the AirDrop attack, the malicious app was copied to the iPhone even if the download was not accepted and the device was rebooted.

Advertisement. Scroll to continue reading.

Users should update to the new platform release as soon as possible, though they can also protect their devices by keeping AirDrop off and ensuring that no one turns it on from the lockscreen.

“This vulnerability clearly highlights that remote access to devices has always been and still is a major risk,” Adam Ely, co-founder of Bluebox, told SecurityWeek. “Users must be careful allowing others to connect to their devices as mobile devices are not as secure as people often think. Luckily, in this case disabling airdrop will prevent this issue.”

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.