Jailbreaking puts iPhone owners at risk, says researcher
Modified iPhones lack security defenses, says 'Pwn2own' winner Charlie Miller
Computerworld - Jailbroken iPhones are much easier to hijack, a noted security researcher said today, and the proof is in the worm that has infected some Australian phones.
The worm, known as "ikee," has been billed as the first iPhone worm, a title that Charlie Miller, famous for hacking iPhones and Macs, said is accurate. "I'd say it was a worm," said Miller. "It spreads, and it executes remote code, so it's a worm." Miller also agreed that it was the first, saying that although he and others have crafted exploits that compromise the iPhone, they have never been wrapped into a worm.
Miller, formerly with the National Security Agency and now an analyst with Baltimore-based Independent Security Evaluators (ISE), was one of three researchers who uncovered the first iPhone vulnerability in July 2007, just weeks after Apple debuted the smartphone. He's also known for successfully hacking Macs two years running at the annual "Pwn2own" contest, and is the co-author of The Mac Hacker's Handbook.
The ikee worm was released last Wednesday by Ashley Towns, a 21-year-old unemployed programmer from Wollogong, Australia, who told the IDG News Service that he intended it as a prank, and as a lesson to users who jailbroke their iPhones.
Miller, however, said that the lesson is more than the one Towns maintained: that users should change the default password of the SSH (secure shell) Unix utility. Towns' worm accessed others' iPhones using that default password, then changed their devices' wallpaper. SSH lets users connect to their iPhone remotely over the Internet over a encrypted channel.
"A year ago, I didn't think that jailbroken iPhones were less secure than those that weren't jailbroken," said Miller. "But I've changed my mind."
By jailbreaking an iPhone -- the term describes the process of modifying a device so its owner can download and install unauthorized software -- people leave themselves open to attacks that an unaltered iPhone would easily deflect, said Miller.
"The obvious reason why they're less secure is that you get extra software on the iPhone when you jailbreak," noted Miller, referring to the tools necessary to both hack the smartphone and install applications not approved by Apple. "But there are other, less-obvious reasons, too."
Among the latter is the fact that by design, a jailbroken iPhone allows software to run as "root," the Unix-based user account allowed to access the entire operating system. That gives hackers automatic access to everything on the iPhone, something not possible on a standard iPhone without an existing vulnerability and a working exploit.
"Jailbroken iPhones don't obey the security model of the iPhone," Miller said. "The whole point [of jailbreaking] is to break the security model."
Jailbreaking sidesteps other Apple-created security defenses for the iPhone, including the "sandbox" that applications are restricted to when they run. "Sandboxing prevents apps from doing things like accessing other apps," noted Miller.
And jailbreaking an iPhone also gives hackers a much easier entry into the iPhone's operating system, which is a bare bones version of the Mac OS X operating system Apple uses for its laptop and desktop computers. "The iPhone's OS is really stripped," said Miller. "There's no shell, for example. So for an attacker, normal shell code doesn't run on an iPhone that's not been jailbroken."
In fact, some of the earliest exploits written for the iPhone assumed that the phone had been jailbroken.
"Apple made it really hard to break into the iPhone," Miller said, citing a layered defense that includes DEP (data execution prevention). "But jailbreaking breaks all those, including DEP," he added.
The ikee worm may be the first on the iPhone, but Miller's betting that it won't be the last. "There's not a lot of mobile expertise out there yet," said Miller. "But as that changes, we'll see more and more exploits, and worms are built on exploits."
- Timeline: How Apple's iOS gained enterprise cred
- Apple and IBM: A winning combo for IT
- IBM and Apple ties go way back
- Apple quickly counters China claim of iPhone spying
- China calls the iPhone and iOS 7 threats to national security
- Apple's CarPlay to dominate infotainment systems, will be in 24M cars by 2019
- Dev interest in OS X Yosemite is 4X what it was for Mavericks in '13
- Apple yanks Google Maps from iCloud's 'Find My iPhone'
- Gartner scales back Windows forecast
- Wal-Mart slashes iPhone 5S and 5C prices by as much as 71% off list
Read more about Security in Computerworld's Security Topic Center.
- Mobile First: Securing Information Sprawl Learn how the partnership between Box and MobileIron can help you execute a "mobile first" strategy that manages and secures both mobile apps...
- Cybersecurity Imperatives: Reinvent your Network Security The Rise of CyberSecurity
- Surescripts Case Study- Securing Keys and Certificates Surescripts implemented Venafi's Trust Protection Platform™ to secure digital keys and certificates, ensure the privacy and confidentiality of electronic clinical information for its...
- Ponemon 2014 SSH Security Vulnerability Report According to research by the Ponemon Institute, 3 out of 4 enterprises have no security controls in place for SSH which leaves organizations...
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities.
- Deep Dive into Advanced Networking and Security with Hybrid Cloud Security and networking are among the top concerns when moving workloads to the cloud. VMware vCloud® Hybrid Service™ enables you to extend your... All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!