Security researchers showed delegates at the Black Hat conference in Las Vegas yesterday how they managed to build a USB charger that can compromise iOS devices in less than 60 seconds.
What’s more, the iPhone or iPad does not need to be jailbroken for the attack to succeed.
Billy Lau, Yeongjin Jang and Chengyu Song, who are all researchers at Georgia Institute of Technology, gave an alarming presentation showing how easy it was to build a malicious charger called Mactans, using a small ARM-powered BeagleBoard running Linux.
During their demonstration, the researchers showed how just plugging a device in “for a quick charge”, was enough to replace the Facebook app on an iPhone or iPad with a malicious version of the app capable of spying on users, and sending sensitive data to a remote third party.
The only caveat is that the iPhone must be unlocked before the attack can begin.
Forbes reports that although the demonstration device looks a little Heath Robinson, with its taped-on picture of a poisonous spider, the team from Georgia Tech believe those in the business of espionage would have no difficulty in creating a more convincing looking device.
The good news is that the researchers informed Apple of the security flaw, and has co-operated with the company with the intention of creating a fix for this serious security flaw.
Although no fixes are yet available for officially-shipping versions of iOS, the beta version of iOS 7 already displays a warning message to users if they attach their device to a possibly untrusted computer.
Trust the currently connected computer?
Trusting this computer will allow it full access to your device and all of its data.
It’s unclear to me at present whether Apple will also provide this security fix for earlier versions of iOS, but let’s hope that they also make moves to protect users in the field from this threat as quickly as possible.
Found this article interesting? Follow Graham Cluley on Twitter to read more of the exclusive content we post.