Researchers demo how apps, chargers can circumvent Apple iPhone, iPad security

Georgia Tech researchers to present findings at Black Hat, USENIX conferences

Call it a case of Jekyll apps that can hide.

Georgia Tech researchers have developed a proof-of-concept attack called Jekyll that involves using Trojan Horse-style apps to sneak malware past Apple’s app review process and onto iOS devices such as the iPhone and iPad.

Georgia Tech Information Security Center (GTISC) Associate Director Paul Royal says we can get lulled into a fall sense of security by Apple’s renowned app review process for iOS devices.

[IPHONEYS: The iPhone 6 edition]

Researcher Tielei Wang’s team created a proof-of-concept attack that was published in the Apple App Store and used to remotely launch attacks on a controlled batch of devices, enabling them to post unauthorized tweets, take photos and even go after other apps.

More detailed findings are being revealed in a paper titled “Jekyll on iOS: When Benign Apps Become Evil,” which will be presented at the USENIX Security Symposium Aug. 14-16 in Washington, D.C.

Separately, researcher Billy Lau’s team has investigated how iOS device peripherals might attack the devices. Using a BeagleBoard, Lau’s team created a USB malicious charger called Mactans that can install apps without user knowledge within a minute of being plugged in.

"Despite the plethora of defense mechanisms in iOS, Mactans was able to install arbitrary apps within one minute of being plugged into current-generation Apple devices running the latest operating system software," said Lau, in a statement. "All users are affected, as our approach requires neither a jailbroken device nor user interaction."

Apple has been notified by the Georgia Tech researchers of the flaws their teams discovered, and the company has implemented a feature in iOS 7 to warn users of suspicious behavior by peripherals. Apple is working on the Jekyll vulnerability.

The peripherals threat is being discussed this week at the Black Hat USA conference in Las Vegas, where Georgia Tech is presenting the paper "Mactans: Injecting Malware into iOS Devices via Malicious Chargers."

The growing threat of compromised mobile devices has largely centered around Android, though security watchers anticipate malware writers to put more effort into cracking iOS devices, particularly as they become more popular in corporate networks. Even Apple rival BlackBerry has addressed this issue by expanding its Secure Work Space offering, which divvies up work and personal apps/data, into Android and iOS environments.

Copyright © 2013 IDG Communications, Inc.

The 10 most powerful companies in enterprise networking 2022