Hackers Find Remote iPhone Crack 114
Al writes "Two researchers have found a way to run unauthorized code on an iPhone remotely. This is different than 'jailbreaking,' which requires physical access to the device. Normally applications have to be signed cryptographically by Apple in order to run. But Charles Miller of Independent Security Evaluators and Vincenzo Iozzo from the University of Milan found more than one instance in which Apple failed to prevent unauthorized data from executing. This means that a program can be loaded into memory as a non-executable block of data, after which the attacker can essentially flip a programmatic switch and make the data executable. The trick is significant, say Miller and Iozzo, because it provides a way to do something on a device after making use of a remote exploit. Details will be presented next month at the Black Hat Conference in Las Vegas." The attack was developed on version 2.0 of the iPhone software, and the researchers don't know if it will work when 3.0 is released.
frost pist (Score:4, Funny)
Re: (Score:1, Redundant)
I, for one, welcome our new iphone botnet overlords!
Re: (Score:1)
Apple are brown hatters, not black.
Good one. Never heard that before.
Is this good news. (Score:5, Insightful)
Does that mean if we go to the "wrong" web site we can enable Wi-Fi tethering without have to pay extra?
Re: (Score:2, Redundant)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Well the current tethering option for the iPhone 3.0 is via bluetooth or connect to your computer via USB. however each iPhone and iPod touch has a normal Wi-Fi support I think it is G so you could take your Edge/G3 network connection and broadcast it so your laptop and any other device that uses Wi-Fi connection can pick it up.
Re: (Score:2)
Re: (Score:2)
Are you sure the IPhone can act as a Wi-Fi access point?
Mac OS X can, so there's no reason an iPhone couldn't. It would use up the battery very quickly though if you're also using the radio for a 3G signal.
Re: (Score:2)
Re: (Score:3, Insightful)
Only if you want to risk losing your service. Tethering without a tethering plan is a violation of AT&T's terms of use. It seems to me that it would be pretty easy to detect. For instance, they could check your browser agent information when you make HTTP requests. They could also look for connections over known ports that would imply you're not on a phone (such as a WoW connection). It seems there are several ways AT&T could spot that you're using a tethered connection without paying for it. So eve
Re:Is this good news. (Score:4, Interesting)
imply you're not on a phone
exactly, imply. If your allowed to install apps on your phone, everything you point out is possibly a new app that AT&T doesn't know about, and would be a pain if AT&T's permission were required to install/run each new type of app. Granted, for the I-Phone crowd, requiring permission to install/use a app isn't uncharted territory. but for the rest of the smart phones, this wouldn't be very nice.
Re: (Score:1)
or, you know, you could have some balls and use the bandwidth you pay for $30 a month in any way you want until they tell you otherwise
Re: (Score:2)
Re: (Score:1, Flamebait)
Misleading Title/Summary (Score:5, Insightful)
Re: (Score:2, Informative)
Well, you're also being a bit misleading. The exploit is to remotely cause unauthorized code to run. What is most misleading about this is that it requires the phone to be jailbroken. It won't work on an OOTB iPhone.
Re: (Score:2)
Re: (Score:2, Informative)
FTFA:
But Miller found more than one instance in which Apple failed to prevent unauthorized data from executing. This means that a program can be loaded into memory as a nonexecutable block of data, after which the attacker can essentially flip a programmatic switch and make the data executable.
The code does not need to be installed, merely downloaded and loaded into memory. The article does not say whether or not they found a remote exploit to make the data executable. Perhaps it is presumed that one will be found.
Comment removed (Score:5, Insightful)
I don't want a walled garden anyhow. (Score:2)
Perhaps, but this activity is the kind of thing Apple used as reason to not allow users their software freedom with their own phone. Around the time of the iPhone's introduction Steve Jobs told Newsweek [msn.com]:
Lea
Re: (Score:1)
Phone Viruses (Score:5, Interesting)
To this date, I cannot think of any cell phone viruses that have existed and spread. I would assume that is because pretty much every cell phone is different, and writing a virus for one specific phone would be a waste of time, since it would represent only a fraction of a percent of the user base. (Usually, when you write a virus, you want it to spread as far and wide as possible, right?) However, with the popularity of the iPhone, I could see a malicious person writing a virus that would infect all of the Apple phones out there, since there are a lot of iPhones on the networks.
Could this crack be used for that? If so, are we going to see an antivirus program on the next iteration of the iPhone?
Re: (Score:3, Insightful)
Might this be the dawn of the first "apple virus" that all Mac users claim will never happen? :-)
Re: (Score:1, Interesting)
When I was in high school many eons ago. The game we would play is how many viri can you get on 1 floppy. We did this on macs. I had a record of 8 :)
Are the newer macs more impervious? Perhaps. But I would venture to say MS has a leg up on them here in that they live it and breath it every day. To Apple it is an abstract thing just due to simple market share.
But a botnet of 300k in remote devices that can CALL people that would be very attractive to a spammer. The payload being a recorded message. T
Re: (Score:1)
"To Apple it is an abstract thing just due to simple market share."
I see how you sneaked that one in there, a sweeping statement that it is part of a much larger debate about the non-prevalence of viruses on Macs.
Much as no-one wants a diversion from the main thrust of this topic, you cannot be allowed to sneak away with such a fallacious and ill-considered statement.
Re: (Score:2)
"all" Mac users (Score:1, Insightful)
Might this be the dawn of the first "apple virus" that all Mac users claim will never happen? :-)
I know you put the smiley there, but still: who are "all" of these Mac users? I have OS X at home (Unix admin for $WORK), and I partly run OS X because there is currently no malware for it. Just as I prefer Unix for servers as they're a small target as well--in general I avoid Windows whenever I can.
There actually were viruses for Mac OS in the pre-X (10) days, but no one's bothered to really try since the current Unix-based OS came out.
Hopefully Apple will put in measures like ASLR, or SELinux-like protect
Re:Phone Viruses (Score:4, Funny)
To this date, I cannot think of any cell phone viruses that have existed and spread.
Windows Mobile ?
Re:Phone Viruses (Score:5, Interesting)
While Windows Mobile is infamous for little bugs and freezes, it actually makes for a very complete mobile platform. Users can edit their Office documents on it, browse the web with it (even easier in WM6.1), play all sorts of media, and find lots of other uses for it. Furthermore, while iPhone OS is becoming just as versatile, it is nowhere near as customizable right off the bat, and application development is much more stringent.
Though I won't lie that it's nowhere as pretty and suave as using the iPhone, nor will it ever be (at least not in the immediate future).
Re:Phone Viruses (Score:4, Insightful)
Re: (Score:3, Informative)
...application development is much more stringent
Not only is it more stringent, but a helluva lot more frustrating in my opinion, because of XCode, IB, and Objective-C. Anyone have any insight into why they chose that language??
Re: (Score:2)
Not sure why this was modded funny, since there is a huge winmo population of phones... granted across different manufacturers, but the underlying code is the same.
Then, in addition to WinMo, there is Symbian, aren't all nokias symbian based.. thats millions of phones...
Re: (Score:2)
Funny because they were referring to Windows Mobile as the virus, not an OS susceptible to them . . .
Re: (Score:2)
Sorry, had not had my caffeine yet, no sense of humour till after.
Re: (Score:2)
Well, Nokia is the Microsoft of the mobile industry. There was a whole range of SMS viruses for Nokia some five years back, I think they finally started to validate the SMS'es better now.
Re: (Score:2)
Oh, they exist. You're right that they're not as widespread as regular ones, since the hardware and software world is much more diverse. But, they are there. For example, there was a talk at blackhat 2007 about them (slides [blackhat.com]). One interesting side part of that talk for me was the question of how to research a cell phone virus without risking infecting the production network. (The answer: one hell of a Farraday cage around the lab.)
Re:Phone Viruses (Score:4, Informative)
What "lot" of iPhones are you talking about? Here in Germany, the iPhone is one of the rarest phones on the market. Because it's double the price of the best Nokia, and has only half the features. And I bet this will be the case for most of the world.
If you want to get a virus going, make it run on Symbian. Or with some luck, you can use J2ME, which pretty much every phone supports, but which is a bit hard to get to do something useful (because of the additional VM/Sandbox).
Re:Phone Viruses (Score:4, Informative)
If you want to get a virus going, make it run on Symbian.
On ancient Symbian versions, perhaps. After S60v3 they added that darn platform security that won’t even let you execute your own code, let alone third-party viruses.
Pirates periodically find cracks, but they tend to be model- and firmware version- specific.
Re: (Score:1)
Sure it's not the most abundant, but 4 million devices is still a lot of devices...
Re: (Score:1)
Re: (Score:1)
* Excluding eBay derivatives which import the phone from somewhere else.
Re: (Score:3, Insightful)
Thing is, non smartphones in Europe have more features than the iPhone. Its just that the interface sucks on most of these phones.
I am going to get the iPhone because I want a device with a good user interface (currently I don't use the mp3 playback on the my phone, mostly because it requires a dock connector on the headphone), I find that the new iPhone has finally a decent camera in it.
Although the user interface of the camera on my current phone (sony ericson) is the best, bar none: slide open, press the
Re: (Score:2)
Here in San Francisco, I am pretty sure everyone and their mother has an iPhone. It feels like a novelty to see another phone.
Re: (Score:2, Interesting)
What about the new Send and Receive Files app in 3.0?
http://gizmodo.com/5171796/iphone-30-os-guide-everything-you-need-to-know [gizmodo.com]
"Send and receive files. A dedicated application to exchange files between iPhones or iPods touch."
Or the new Peer-to-peer Bluetooth connectivity?
"A new API will allow for two iPhones to connect directly peer-to-peer via Bluetooth. They will be able to discover each other using Bluetooth, and then s
Re: (Score:2)
Re: (Score:1)
Re: (Score:2)
My Phone right now has connected to my PC via bluetooth and is updating the track list over bluetooth. Hence the posters position, its like the iPhone not having MMS capability (I know its getting it), its such a basic feature most people assume it will be built into the phone.
Re: (Score:2)
It might be more prudent to fix the unsigned code execution vulnerability first, but phone antivirus is a good idea and would be innovative.
Re: (Score:2)
I run the VNC server on my phone (veency) and I constantly get requests to connect while I am on the AT&T network.
Just to illustrate your point
No infection vector? (Score:2)
Viruses spread not because a computer can be broken into, but because a computer can be broken into AND because it can broadcast the virus to other computers.
That's why there were no wild Palm OS viruses even when Palm had 80% of the market for years, because the only way to transfer the infection from one Palm to another was for the owner of the infected Palm and the target to deliberately beam a file from one to another.
For cellphones, there's even fewer opportunities for infection, because iPhone owners
Re: (Score:2)
You just need to find a buffer overflow in a game that's popular enough that you're likely to actually find enough people playing it, that doesn't crash the game when you run the exploit because people tend to notice when their games crash, and then write a program to find someone playing it that won't flatten the battery by keeping the bluetooth radio continually active...
Re: (Score:2)
Re: (Score:2)
Active worms or passive viruses, they still need an infection vector. Without traffic between phones to piggyback on, there's no vector, and no propagation of the virus.
Capt Crunch? (Score:2, Interesting)
Is there any irony in that some early Apple folks started out phone phreaking?
Re: (Score:3, Insightful)
Woznia = phreak :: Jobs = control phreak (Score:3, Funny)
They went from blue boxes to beige boxes to white boxes. Now the white boxes themselves are getting blue-boxed ;-)
That is, play the right piece of software at 2600 Hz into the iPhone microphone and you can use it to access the whole network instead of Apple and AT&T's walled garden.
Only this time, the wall is on your phone and not the network.
Chances (Score:1, Insightful)
Well, it's all just chance calculation. Let's say that 1 million iPhones/iPod Touches were sold. Let us then assume that 0.5 percent of the people that buy an iPhone are Evil Haxx0rz and want to hack their new phone. I guess that no more that a half percent of *that* group succeed in finding a way to execute arbitrary code.
One of the 25 is holding his speech at the Black Hat conference in Las Vegas.
Re: (Score:2)
You're not making any sense.
Somebody wanting to mess with their own phone is not an "Evil Haxx0r". Nor they need this, since they can jailbreak it already.
What this gives to a real "Evil Haxx0r" is the ability to mess with your phone. And though as you point out the amount of people with the ability to do such things is small, it can also be quite profitable, and programs that make it easy can be made, which will let every script kiddie on the planet exploit your phone with one click.
This is news? (Score:2, Insightful)
TFA makes it sound like there have never been any remotely exploitable vulnerabilities in the iPhone before. There have been dozens of exploitable bugs in Webkit, for example. The fact that no phones were cracked at Pwn2Own didn't prove they weren't crackable.
Re: (Score:2, Interesting)
Not Safari (Score:2)
Good old Presto Changeo! (Score:1)
As I recall, Microsoft used to have an api call called PrestocChangeo or some such that did this. Probably in Win16. Always thought that changing a chunk of data into executable code was a bad idea. I would have thought such nonsense was a thing of the past but who knows, maybe that same or similar api still exists. (I'm an old guy and I don't get down to the system level calls much anymore, someone younger will need to look.)
iPhone Access Structure is locked down? (Score:1)
Don't get me wrong. Any exposure is bad, but the summary makes this sound like some full blown windows remote code execution issue.
Are there any iPhone developers who can chime in with some insight?
Re: (Score:3)
They have found a bug in the protection mechanism which prevents the type of exploit of which you talk.
Re: (Score:3, Insightful)
Sure, and btw, nicely designed Apple tinfoil hat.
Re: (Score:1, Troll)
Re: (Score:2)
It wouldn't be much of a 'hack' unless it included privilege escalation.
An app that smashes its own stack (Score:3, Interesting)
Simply get your application published and give people some incentive to download it (for free). Once your intended target or target quota has installed download a "media file" that's actually the malicious binary. Then it's just a matter of smashing your own application's stack to run the code.
Re: (Score:3, Insightful)
I haven't done the legwork but it appears that an attack vector exists via the App Store. Applications allow downloading of data files (podcasts, for example).
Simply get your application published and give people some incentive to download it (for free). Once your intended target or target quota has installed download a "media file" that's actually the malicious binary. Then it's just a matter of smashing your own application's stack to run the code.
The "simply get your application published" bit, though not impossible to avoid, would leavea a trail leading all the way up to you.
You'd get more satisfaction out of creating a Windows virus.
yeah, sure (Score:2)
Details of the exploit will be presented next month...
My remote iPhone exploit is a Canadian supermodel.
Re: (Score:2, Insightful)
Well half of the geeks have below average intelligence. Just because you think tech stuff and science is neat it doesn't mean you are any smarter then the rest of the population.
Re:Dumbing down the text... (Score:4, Insightful)
My experience with dealing with geeks seem to show me that the distribution of intelligence is about on par with the rest of the population, in its normal distribution. We like to see our selfs better then everyone else but that really isn't the case.
I have found that people who are on the manufacturing floor of a factory are just as likely to pick up an abstract explanation as a geek would. Sure geeks have memorized some terms and vocabulary however for the most part their ability to understand is about the same as everyone else.
Conversely there are a lot of people who know things that it is difficult for me to comprehend who are not geeks about the same amount who are geeks.
You analogy is off. Because geeks are a sub-culture Nobel Prise Winners are people who won an award for their excellence.
What does it take to be a geek. Watch a lot of Star Trek, or Sci-Fi, Read Comic Books, Write code (I was able to do then when I was 6 years old) none of this requires a high intelligence, to preform at some level.
Re: (Score:2)
Re: (Score:3, Informative)
Very well said...that's one of the self-delusions of many in the geek community that really irritates me (that we're smarter ergo better than everyone else). It seems a lot of this goes along with the rise of geek chic.
In highschool and the like, I always felt sorriest for the dumb geeks / dumb nerds...they had it worst of all IMHO. And yes I agree, there are absolutely dumb geeks
Re: (Score:3, Funny)
Very well said...that's one of the self-delusions of many in the geek community that really irritates me (that we're smarter ergo better than everyone else). It seems a lot of this goes along with the rise of geek chic.
But isn't the point of choosing to be in any social group an effort to feel better about oneself? Some geeks take the easy way out by making themselves feel taller by shoving people beneath them.
Re: (Score:3, Insightful)
But isn't the point of choosing to be in any social group an effort to feel better about oneself? Some geeks take the easy way out by making themselves feel taller by shoving people beneath them.
Yeah, I absolutely agree.
I have a very vivid memory of being in 7th grade science class and snickering at this kid who could barely read. At the time it was annoying, funny, and felt like a waste of my time to be in this class (which it probably was) ...and my friends and I snickered. I've felt guilty about that for a long time...one of my "wake up" moments in life.
Re: (Score:1)
Don't be too hard on yourself. Children are self-centered, then we grow out of it.
Re: (Score:2)
It seems a lot of this goes along with the rise of geek chic.
When did this happen and why wasn't I informed?
Re: (Score:2)
I have found that people who are on the manufacturing floor of a factory are just as likely to pick up an abstract explanation as a geek would.
So being a geek is more a function of nerd literacy rather than intelligence? I concur. I would also expand this to personal hygiene (specifically lack thereof) as well.
Re: (Score:2, Funny)
He's saying that geeks are a random sample of the population with regard to intelligence, yes. If you've ever heard an MSCE call himself a geek, you'd agree.
Re: (Score:1, Offtopic)
Half of the geeks have inteligence below the median inteligence of the geek population.
Re: (Score:2, Funny)
yehe, dem sai dat eyem sisks standird dieaveations twu da leaft
Re: (Score:1)