iOS Vulnerability Could Have Given Hackers Total Control Over Devices

Trending

Stories

While most of us were trying to balance childcare with work from home or catching up on our favorite Netflix series, Ian Beer discovered an iOS exploit that would have given hackers total control over phones and devices.

Beer, a security researcher at Google’s Project Zero, spent six months before finally finding, confirming, and demonstrating the vulnerability. However, he was quick to point out that Apple released a patch for the weakness back in May, adding that he had “no evidence that these issues were exploited in the wild.”

Also Read

Nonetheless, the researcher says the exploit allowed attackers to remotely reboot phones and grab control of them from a distance. That means that threat actors could have accessed users’ photos, emails, and documents and snooped on them through the device’s microphone and camera. How? Beer explains that today’s iPhones and iPads use the Apple Wireless Direct Link (AWDL) protocol to generate mesh networks for features like AirDrop and Sidecar.

The first allows consumers to easily send (or beam) files to other iOS devices, while the second turns iPads into secondary screens. And according to Beer, the vulnerability lies in the AWDL protocol, which he was able to exploit. He was even able to activate AWDL when it was turned off.

Apple did not challenge Beer’s findings and cited him in the changelogs for it may exploit-related update that fixed the issue. However, the tech giant revealed that the majority of iOS users are using newer software versions that have been patched.

It also added that cybercriminals needed to be within WiFi range to take advantage of the vulnerability and infiltrate users’ devices. Luckily, it appears that threat actors did not exploit it. Otherwise, they would have invaded iOS users’ privacy on a massive level.

VPNs offer an extra layer of security and privacy by rerouting and encrypting users’ Internet traffic, masking their IP addresses, and erasing their activity logs. Streamers can also benefit from these tools to unblock geo-restricted content.

Stay updated

Subscribe to our newsletter and never miss an update on the latest tech, gaming, startup, how to guide, deals and more.

Latest

Stories

- Advertisement -
- Advertisement -

Grow Your Business

Place your brand in front of tech-savvy audience. Partner with us to build brand awareness, increase website traffic, generate qualified leads, and grow your business.

Latest

- Advertisement -

Related

- Advertisement -
TikTok Targets $20B E-Commerce Expansion in Southeast Asia WatchOS 10: Automatic Night Mode for Apple Watch Ultra Twitter Blue: One-Hour Tweet Editing Window for Subscribers Google Pay Enables Aadhaar-Based UPI Authentication iOS 17: Improved Autocorrect with Personalized On-Device ML OnePlus Nord N30 5G goes official in the U.S. Apple Introduces Vision Pro VR Headset for Augmented and Virtual Reality Microsoft to Pay $20M Fine for Violating Children’s Privacy with Xbox
TikTok Targets $20B E-Commerce Expansion in Southeast Asia WatchOS 10: Automatic Night Mode for Apple Watch Ultra Twitter Blue: One-Hour Tweet Editing Window for Subscribers Google Pay Enables Aadhaar-Based UPI Authentication iOS 17: Improved Autocorrect with Personalized On-Device ML OnePlus Nord N30 5G goes official in the U.S.