Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

iOS Backdoors Expose Personal Data: Researcher

Several undocumented forensic services running on all iOS devices can be leveraged as attack points and surveillance mechanisms, a security researcher revealed at the Hope X conference last week.

Several undocumented forensic services running on all iOS devices can be leveraged as attack points and surveillance mechanisms, a security researcher revealed at the Hope X conference last week.

Jonathan Zdziarski, an expert in iOS security and forensics who has often assisted law enforcement and the US military on projects and criminal cases, says the services in question have evolved a great deal over the past years, up to the point where they can be used to access unencrypted data.

According to the researcher, the services, which are available without “developer mode,” require the iOS device to be paired with a computer or other device. iOS 7 asks users for confirmation when pairing to a device, but on older versions it’s done automatically.

One of the services analyzed by Zdziarski is com.apple.pcapd, which is basically a packet sniffer that dumps network traffic and HTTP request/response data traveling to and from the device.

An even more interesting service, called com.apple.mobile.file_relay, completely bypasses the backup encryption provided to device owners. The feature, which once was thought to be benign, can be used to access email and social media accounts, the SQLite database for the user’s address book (including deleted records), GPS logs, caches, photos, email metadata, call history, and the databases for SMS, voicemail, calendar, alarm, and notes. In iOS 7, the service can be used even to obtain a complete metadata disk sparse image of the file system (without actual content), the researcher said.

The com.apple.mobile.house_arrest service, which was initially developed to allow iTunes to copy documents to and from third-party applications, can now be used to access various folders that contain photos, social media caches, and other sensitive data, Zdziarski explained in his presentation.

The researcher has pointed out that these capabilities are similar to ones described recently by German publication Der Spiegel in a report on how the United States National Security Agency’s (NSA) can access smartphone data. Zdziarski says that while he’s not accusing Apple of working with the NSA, he believes that some of the services he has described might have been used by the agency to collect data.

“I am not suggesting some grand conspiracy; there are, however, some services running in iOS that shouldn’t be there, that were intentionally added by Apple as part of the firmware, and that bypass backup encryption while copying more of your personal data than ever should come off the phone for the average consumer. I think at the very least, this warrants an explanation and disclosure to the some 600 million customers out there running iOS devices,” Zdziarski wrote in a blog post on Friday.

Advertisement. Scroll to continue reading.

 Apple admits assisting law enforcement based on subpoenas, search warrants, and court orders, but in a statement made after Zdziarski’s presentation, the company has reiterated that it has never worked with any government agency from any country to create backdoors in products or services.

 “We have designed iOS so that its diagnostics functions do not compromise user privacy and security, but still provides needed information to enterprise IT departments, developers and Apple for troubleshooting technical issues,” Apple stated. “A user must have unlocked their device and agreed to trust another computer before that computer is able to access the limited diagnostics data. The user must agree to share this information, and data is never transferred without their consent.”

However, the expert is not satisfied with Apple’s explanation, arguing that since the services expose too much personal information and there is no notification to the user, it’s unlikely that they’re intended solely for diagnostics.

“I understand that every OS has diagnostic functions, however these services break the promise that Apple makes with the consumer when they enter a backup password; that the data on their device will only come off the phone encrypted. The consumer is also not aware of these mechanisms, nor are they prompted in any way by the device. There is simply no way to justify the massive leak of data as a result of these services, and without any explicit consent by the user,” Zdziarski said in a blog post published on Monday in response to Apple’s statement.

 

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Mobile & Wireless

Samsung smartphone users warned about CVE-2023-21492, an ASLR bypass vulnerability exploited in the wild, likely by a spyware vendor.

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Fraud & Identity Theft

A team of researchers has demonstrated a new attack method that affects iPhone owners who use Apple Pay and Visa payment cards. The vulnerabilities...

Mobile & Wireless

Critical security flaws expose Samsung’s Exynos modems to “Internet-to-baseband remote code execution” attacks with no user interaction. Project Zero says an attacker only needs...

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...