This article is a prepared story. It describes an event that is scheduled or expected but has not yet occurred.If this article is ready to be developed, change the {{prepare}} tag to {{develop}}. Prepared articles may (tempered by common sense, please) be subject to deletion if unsourced (with 10 days’ notice) or if unused and expired (after 5 days). |
This article is a prepared story. It describes an event that is scheduled or expected but has not yet occurred.If this article is ready to be developed, change the {{prepare}} tag to {{develop}}. Prepared articles may (tempered by common sense, please) be subject to deletion if unsourced (with 10 days’ notice) or if unused and expired (after 5 days). |
This article is being developed. You can contribute or discuss its development.If it is ready to be checked, you can submit it for review?Template:Assistant:Submit/formSubmit for review.This is not a way to ask others to expand or finish the article!If original reporting is contained in this article, you must provide notes. |
This article is being developed. You can contribute or discuss its development.If it is ready to be checked, you can submit it for review?Template:Assistant:Submit/formSubmit for review.This is not a way to ask others to expand or finish the article!If original reporting is contained in this article, you must provide notes. |
Thursday, June 2, 2022
You can add an infobox from Category:Infoboxes.
On 12 May 2022, Secure Mobile Networking Lab, TU Darmstadt, Germany published a report of vulnerability in a jailbroken iPhone that allows an attacker to gain control over the device when it is seemingly off. In what is known as low-power mode, some chips of the device continue to run, with the benign intent of supplying users with some limited functionality, such as finding their device and some types of contactless keys.
The low-power mode involves supplying power to the Bluetooth chip, and the researchers showed how this could be misused to add malware to the device. This malware would operate in the low-power mode without switching on the device. The reporters noted jailbroken devices were not common, and majority of consumers did not jailbreak their phones. Furthermore, the researchers pointed out that this attack vector needed more research to evaluate the risk of writing more sophisticated malware that can attack non-jailbroken devices.
Researchers published their modified Broadcom firmware at InternalBlue and Frankenstein repositories.