IDG News Service - Apple Inc. has just over a day left to patch a bug in its iPhone software that could let hackers take over the iPhone just by sending out an SMS (Short Message Service) message.
The bug was discovered by noted iPhone hacker Charlie Miller, who first talked about the issue at the SyScan conference in Singapore. At the time, he said that he had discovered a way to crash the iPhone via SMS, and that he thought the crash could ultimately lead to working attack code.
Since, then he has been working hard, and he said he's able to take over the iPhone with a series of malicious SMS messages. In an interview Tuesday, Miller said he will show how this can be done during a presentation at the Black Hat security conference in Las Vegas on Thursday with security researcher Collin Mulliner.
"SMS is an incredible attack vector for mobile phones," said Miller, an analyst with Independent Security Evaluators. "All I need is your phone number. I don't need you to click a link or anything."
Miller reported the flaw to Apple about six weeks ago, but the iPhone's maker has yet to release a patch for it. Apple representatives could not be reached for comment, but the company typically keeps quiet about software flaws until it releases a patch.
If it does release a pre-Black-Hat patch, Apple will not be alone. Microsoft Corp. had to scramble to put out an emergency fix for a flaw in its Active Template Library (ATL), which is used to build ActiveX controls. That "out-of-cycle" patch was released Tuesday, ahead of another Black Hat presentation on that particular vulnerability.
Miller's attack doesn't pop up shellcode -- the basic software attackers use as a steppingstone to launch their own programs on a hacked machine -- but it lets him control the instructions that are within the phone's processor. With some more work, someone could take this exploit and run shellcode, Miller said.
Although it's an old technology, SMS is emerging as a promising area of analysis as security researchers use the powerful computing capabilities of the iPhone and Google Inc.'s Android software to take a closer look at the way SMS works on mobile networks.
On Thursday, two other researchers, Zane Lackey and Luis Miras, will show how they can spoof SMS messages that would normally only be sent by a carrier's servers. This type of attack could be used to change someone's phone settings simply by sending him an SMS message.
Miller believes that more SMS bugs are likely to emerge. To help find them, he and Mulliner have developed an SMS "fuzzing" tool that can be used to hammer a mobile device with thousands of SMS messages without actually sending the messages over the wireless network (a costly endeavor).
The tool, which he calls the Injector, runs on the iPhone, Android-based devices and Windows Mobile phones.
The tool inserts itself between the phone's computer processor and the modem and makes it look like the SMS messages are coming through the modem when in fact they're being generated by the phone.
- Apple will 'set the world on fire' with iPhone 6 sales
- The other Apple economy: $2B in devices on eBay
- Apple sends users scrambling for OS X Yosemite
- Apple grows Mac sales by 18% on the back of the MacBook Air
- What to listen for during Apple's earnings call today
- Timeline: How Apple's iOS gained enterprise cred
- Apple and IBM: A winning combo for IT
- IBM and Apple ties go way back
- Apple quickly counters China claim of iPhone spying
- China calls the iPhone and iOS 7 threats to national security
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- Virtually Delivered High Performance 3D Graphics "A picture is worth a thousand words." That old phrase is as true today as it ever was. Pictures (i.e., those with heavy...
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- Top Tips for Securing Big Data Environments: Why Big Data Doesn't Have to Mean Big Security Challenges Organizations must come to terms with the security challenges they introduce. As big data environments ingest more data, organizations will face significant risks...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!