Skip to main content

iPhone Vulnerability, Mac OS X Rootkit Debut at Black Hat

iPhone Vulnerability, Mac OS X Rootkit Debut at Black Hat

The annual Black Hat security conference has gotten underway in Las Vegas, and, as promised, security researchers have detailed a technique that, in theory, could enable attackers to take over Apple’s popular iPhone using nothing by SMS messages which would be invisible to the iPhone’s owner. Apple has also took another hit on the chin with the demonstration of a proof-of-concept rootkit for Apple’s Mac OS X operating system, which—if exploited—could begin exposing the Macintosh to the kinds of malware nightmares Windows users have been enjoying for years.

As promised earlier this month, noted security analyst Charlie Miller detailed an exploit that potentially enables attackers to take over an iPhone using SMS messages; once in control, attackers could listen in on calls, access the phone’s location via GPS, run their own programs, and even use iPhones to participate in denial-of-service attacks. At his presentation, Miller also illustrated the flaw using Android- and Windows Mobile-based devices.

Miller informed Apple of the problem earlier this month, giving the company a chance to release a patch before going into detail of the vulnerability at the Black Hat conference. To date, Apple has not released any update to its iPhone software to address the problem, although a spokesman for European mobile carrier O2 has indicated Apple intends to release a patch for the SMS vulnerability imminently via iTunes. Miller said Google has already taken steps to address the problem. Apple recently issued an advisory warning users of jailbroken iPhones that they face greater vulnerability, including unreliable voice and data services, instability, and (perhaps most significantly) the inability to install crucial system updates from Apple.

Security researcher Dino Dai Zovi also demonstrated a proof-of-concept rootkit for Mac OS X, potentially opening an avenue for a flood of malware on Apple’s computer operating system. Although Macintosh computers have historically not suffered attacks from worms, trojans, viruses, and other security exploit that Windows users have had to cope with for years, this has more to do with where attackers spend their time than anything innately more secure about the Mac: in fact, many security researchers rank the security of Mac OS X and Apple’s core applications below that of other mainstream operating systems.

Zovi, who wrote The Mac Hacker’s Handbook with Miller, demonstrated his proof of concept rootkit, implemented as a kernel proxy server on a controlling host, with remote agents running on compromised hosts. Once a system has been breached, it can obtain ports from the compromised kernels just like a local application; Zovi plans to release demonstrations of logging SSL traffic, iChat instant messaging sessions, and a way to grab frame from a Webcam; he also plans to publish a tool to identify compromised hosts. Apple has not commented on whether it has, or intends to, patch the vulnerability on which the rootkit is based.

Editors' Recommendations

Geoff Duncan
Former Digital Trends Contributor
Geoff Duncan writes, programs, edits, plays music, and delights in making software misbehave. He's probably the only member…
How to change your iPhone’s notification sound in iOS 17
how to change iphone default notification sound ios 17 sounds screenshot

Apple made a change to the default notification sound when it launched iOS 17, replacing “Tri-tone” with “Rebound.”Users have been unable to switch back to the original sound or select a different one as the default, and not everyone is a fan of the new tune. As you'd imagine, that's left some folks rather annoyed.

Read more
How to fix the ‘iPhone Unavailable’ error on any iPhone
Three iPhones showing security lockout screens and reset options.

Your iPhone comes with a nifty feature that locks out strangers if they input the wrong password too many times. This is a great safety tool to keep your device away from prying eyes and to ensure someone doesn't randomly guess your password through multiple sign in attempts.

However, it can also be a nuisance. If you're in a hurry or just waking up in the morning, entering the wrong password multiple times will get you to the same "iPhone Unavailable" message.

Read more
How to reverse image search on Android or iPhone

A reverse image search is a handy way to figure out the origin of an image, locate similar images, or fact check an image. There are a multitude of ways to perform a reverse image search on your mobile device, whether you're using an Android phone or an iPhone.

For example, here's how to do a reverse image search via Google lens on Android:

Read more