Skip to main content

iPhone Vulnerability, Mac OS X Rootkit Debut at Black Hat

iPhone Vulnerability, Mac OS X Rootkit Debut at Black Hat

The annual Black Hat security conference has gotten underway in Las Vegas, and, as promised, security researchers have detailed a technique that, in theory, could enable attackers to take over Apple’s popular iPhone using nothing by SMS messages which would be invisible to the iPhone’s owner. Apple has also took another hit on the chin with the demonstration of a proof-of-concept rootkit for Apple’s Mac OS X operating system, which—if exploited—could begin exposing the Macintosh to the kinds of malware nightmares Windows users have been enjoying for years.

As promised earlier this month, noted security analyst Charlie Miller detailed an exploit that potentially enables attackers to take over an iPhone using SMS messages; once in control, attackers could listen in on calls, access the phone’s location via GPS, run their own programs, and even use iPhones to participate in denial-of-service attacks. At his presentation, Miller also illustrated the flaw using Android- and Windows Mobile-based devices.

Recommended Videos

Miller informed Apple of the problem earlier this month, giving the company a chance to release a patch before going into detail of the vulnerability at the Black Hat conference. To date, Apple has not released any update to its iPhone software to address the problem, although a spokesman for European mobile carrier O2 has indicated Apple intends to release a patch for the SMS vulnerability imminently via iTunes. Miller said Google has already taken steps to address the problem. Apple recently issued an advisory warning users of jailbroken iPhones that they face greater vulnerability, including unreliable voice and data services, instability, and (perhaps most significantly) the inability to install crucial system updates from Apple.

Security researcher Dino Dai Zovi also demonstrated a proof-of-concept rootkit for Mac OS X, potentially opening an avenue for a flood of malware on Apple’s computer operating system. Although Macintosh computers have historically not suffered attacks from worms, trojans, viruses, and other security exploit that Windows users have had to cope with for years, this has more to do with where attackers spend their time than anything innately more secure about the Mac: in fact, many security researchers rank the security of Mac OS X and Apple’s core applications below that of other mainstream operating systems.

Zovi, who wrote The Mac Hacker’s Handbook with Miller, demonstrated his proof of concept rootkit, implemented as a kernel proxy server on a controlling host, with remote agents running on compromised hosts. Once a system has been breached, it can obtain ports from the compromised kernels just like a local application; Zovi plans to release demonstrations of logging SSL traffic, iChat instant messaging sessions, and a way to grab frame from a Webcam; he also plans to publish a tool to identify compromised hosts. Apple has not commented on whether it has, or intends to, patch the vulnerability on which the rootkit is based.

Geoff Duncan
Former Digital Trends Contributor
Geoff Duncan writes, programs, edits, plays music, and delights in making software misbehave. He's probably the only member…
I put Google Gemini on my iPhone. Here’s why I’ll never go back to Siri
Siri in background and Gemini widgets on Lock Screen.

The AI frenzy has gripped every smartphone maker in 2025. Unfortunately, not all of it has been as revolutionary as on-stage presentations would have you believe. A few, however, have done a fantastic job with executing practical AI features.

Google is one of those names, and it continues to do so even on iPhones — at the cost of making Siri look like an outdated relic. The latest build of Google’s Gemini app for iPhones puts the AI chatbot everywhere on Apple’s smartphones, from the lock screen to the share sheet.

Read more
AI-powered Priority Notifications land on iPhones with iOS 18.4 update
Priority Notifications on an iPhone’s Lock Screen

Apple has just released the first beta build of iOS 18.4 update. Even though it is not loaded with new features, it brings a cool new trick called Priority Notifications. Once enabled, the tool will use AI to automatically surface notifications that are deemed important.

”Priority notifications appear at the top of the stack, letting you know what to pay attention to at a glance,” says Apple. The company doesn’t offer any technical detail on how exactly the onboard AI decides which notifications are important and surfaces them.

Read more
Apple iPhone 16e vs. iPhone 14: How different are they?
An iPhone 14 laying on a table. The display is on and showing the home screen.

Apple's entirely new device, the iPhone 16e, is here. For those of us expecting a new budget iPhone SE, this has come as a big surprise. Apple's new midrange handset combines the iPhone 14's looks with the iPhone 16's power and Apple Intelligence, and it sits comfortably in the place the iPhone 14 once sat. How does it compare to the phone it's replaced, and is it worth your hard-earned cash?

In this piece, we'll compare the Apple iPhone 16e to the iPhone 14 to see which of these two devices is the better buy, from battery and charging, to performance and cameras.
Apple iPhone 16e vs. iPhone 14: specs

Read more