Researchers at Independent Security Evaluators claim they've developed a proof-of-concept exploit for a bug, and they'll give the details about it at BlackHat.
After countless researchers have spent weeks trying to break Apple's new iPhone, three announced Sunday they have developed a proof-of-concept exploit for a vulnerability that would let a remote attacker steal information off the sought-after device.
The three researchers -- Dr. Charlie Miller, Jake Honoroff, and Joshua Mason -- are members of the software security team at Independent Security Evaluators, an information security consulting firm. An advisory on the company Web site noted that Miller will present the full details of the iPhone exploit at the BlackHat USA Conference in Las Vegas on Aug. 2.
The advisory also reported that the researchers notified Apple about the flaw and proposed a fix that they could include in a future iPhone update. They noted that Apple responded and said it's looking into it.
They also noted in their advisory that the vulnerability is present in both the Mac and Windows versions of the Safari Web browser, though it may not be exploitable there.
"Within two weeks of part-time work, we had successfully discovered a vulnerability, developed a toolchain for working with the iPhone's architecture (which also includes some tools from the #iphone-dev community), and created a proof-of-concept exploit capable of delivering files from the user's iPhone to a remote attacker," researchers wrote in the advisory. "The exploit is delivered via a malicious Web page opened in the Safari browser on the iPhone. There are several delivery vectors that an attacker might utilize to get a victim to open such a Web page."
When the iPhone's version of Safari opens a malicious Web page, arbitrary code embedded in the exploit is run with administrative privileges, the researchers said.
"In our proof of concept, this code reads the log of SMS messages, the address book, the call history, and the voicemail data," researchers wrote. "It then transmits all this information to the attacker. However, this code could be replaced with code that does anything that the iPhone can do. It could send the user's mail passwords to the attacker, send text messages that sign the user up for pay services, or record audio that could be relayed to the attacker."
The advisory noted that since the iPhone learns access points by name (SSID), if a user ever gets near an attacker-controlled access point with the same name (and encryption type) as an access point previously trusted by the user, the iPhone will automatically use the malicious access point. This allows the attacker to replace the requested page with a page containing the exploit.
The researchers also noted that if an attacker can trick a user into opening a malicious Web site, the attacker can easily embed the exploit into the main page of the Web site.
Researchers are holding back detailed information until BlackHat.
The researchers advised iPhone users to visit only Web sites that they trust, only use trusted Wi-Fi networks, and don't open any Web links in e-mails.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.