Blog Layout

New iPhone Security Hack Allows Total Takeover Of Device

sccomputerguys • Dec 17, 2020

Do you own an iPhone? If so, although you may not know the name, you owe Ian Beer your thanks.

Recently, he discovered an absolutely devastating iPhone hack that allowed attackers to take complete control over a target device from a distance with absolutely no action required on the part of an unsuspecting victim.

In virtually every phone hack out there, some user action is required. Hackers use social engineering tricks to get their victims to tap a link, open a file, grant permissions, or something similar, and then abuse those permissions once they have them. This attack is different. A hacker can take control with no action on the part of the unsuspecting user and do pretty much anything they want with the device.

At the heart of the vulnerability is AWDL, which is the protocol Apple uses that allows Mac, iPhones and other devices to create a peer-to-peer mesh network, which in turn, enables features like AirPlay and AirDrop.

Without getting into the technical details, the essence of the attack is that a hacker can remotely reboot your phone and take control when they come back online, having full access to your photos, messages and all of your user data.

If there's a silver lining in all of this, it lies in the fact that Apple has already patched the exploit. In fact, it was patched back in May, 2020, but if it's been a while since you've updated your device, you might be vulnerable.

Given the fact that this is an obscure, technical exploit, it's not terribly surprising that there's no evidence of it ever having been used in the wild. However, the fact that it exists at all, and that there are undoubtedly unpatched devices out there that are vulnerable to it, is terrifying. Make sure your iPhone is up to date and at the very least, you'll be able to take this off of your list of things to worry about.

By sccomputerguys 22 Jul, 2022
Do you own one or more of the following products made by Cisco? The RV110W Wireless-N VPN Firewall The RV130 VPN Router The RV130W Wireless-N Multifunction VPN Router The RV215W Wireless-N VPN ...
By sccomputerguys 21 Jul, 2022
Do you use Microsoft Teams?  If so, you'll be thrilled to know that the Redmond Giant is continuing to pour resources into improving the software with a specific focus on audio and ...
By sccomputerguys 20 Jul, 2022
Corporate branding can be worth its weight in gold and certain images are absolutely iconic.  The Golden Arches, the Nike "swoosh," and Apple's Apple all come to mind. Logo images give companies ...
By sccomputerguys 19 Jul, 2022
Remember the Heartbleed scare we had a couple years back?  It was a nasty side-channel attack that was somewhat exotic and difficult to pull off, and it was absolutely devastating and sent ...
By sccomputerguys 18 Jul, 2022
Microsoft Exchange servers are once more in the crosshairs of hackers around the world.  Most recently, hacking groups have been specifically targeting them to deploy BlackCat ransomware. As is common among ransomware ...
By sccomputerguys 16 Jul, 2022
If you grew up in the days before the internet, it's absolutely staggering to think of all the ways that mobile technology has changed our lives (and mostly for the better). Remember ...
By sccomputerguys 15 Jul, 2022
It may seem as though Internet Explorer is the browser that will not die, but according to Microsoft, it is now a step closer to breathing its last virtual breath. Microsoft has ...
By sccomputerguys 14 Jul, 2022
If you're involved with IT Security at any level and if your network includes Linux servers, keep a watchful eye out for the new Panchan botnet. It first appeared in the wilds ...
By sccomputerguys 13 Jul, 2022
These days, companies spend significant sums of money to protect themselves from cyber criminals.  The threat matrix is vast, and attacks can come from almost any quarter. That is why many companies ...
By sccomputerguys 12 Jul, 2022
Do you receive healthcare of any kind from Kaiser Permanente?  If so, be aware that they recently published a data breach notification indicating that an unidentified attacker accessed an email account that ...
More Posts
Share by: