Google researcher discovers iPhone vulnerability that allows hackers to ‘completely control’ device within range



[ad_1]

A Google researcher exploited a since patched iPhone vulnerability that allowed hackers to control any iPhone within WiFi range.

Ian Beer, a security researcher for Google’s vulnerability detection initiative called Project Zero, said in a Monday blog post that he spent six months of 2020 trying to uncover an exploit in which he was able to “take full control of any iPhone” in its vicinity.

Teleprinter security Latest Change % Change
AAPL APPLE INC. 123.06 -0.02 -0.02%
GOOGL ALPHABET INC. 1,834.19 +9.22 + 0.51%

Apple confirmed to FOX Business that the issue was fixed before the company released iOS 13.5 in May, which included a contact tracing feature for COVID-19.

“This issue was fixed in May with iOS 13.5 and the vast majority of our users are keeping their software up to date as you can see here from data released around the time this was fixed,” a carrier said. word of Apple. “The other point is that it’s good to note that it requires some proximity as it needs to be within WiFi range. Hope this is helpful.”

RARE APPLE 1, SIGNED BY STEVE WOZNIAK, MAY WORTH $ 400G

Beer said he had no evidence that the vulnerabilities he found were “exploited in the wild.” Research like his, however, prevents these issues from allowing would-be hackers to take advantage of people’s devices and gain access to personal information.

“The takeaways from this project shouldn’t be: no one will spend six months of their life just hacking my phone, I’m fine,” Beer wrote. “Instead, it should be: one person, working alone in her bedroom, was able to create an ability that would allow her to seriously compromise iPhone users with whom she would be in close contact.”

The sophisticated teams of hackers and “the companies providing the global cyber weapon trade … are generally not just individuals working alone” as they were when he discovered the exploit, Beer noted.

GET FOX BUSINESS ON THE ROAD BY CLICKING HERE

“These are well-funded and well-targeted teams of expert collaborators, each with their own specialization,” he writes. “They don’t start with absolutely no idea how Bluetooth or WiFi works. They also potentially have access to information and hardware that I just don’t have, like development devices, special cables, source code, symbol files, etc. “

In conclusion, Beer said in part that there needs to be a “renewed focus on finding vulnerabilities,” which means “not just more variant analysis, but a significant and dedicated effort to understand how attackers operate. really and beat them at their own game by doing what they do best. “

CLICK HERE TO LEARN MORE ABOUT FOX BUSINESS

[ad_2]

Source link