Eblogtip.com
  • Categories
    • News
    • Technology
    • Domains
    • Hosting
    • Promotions

Archives

  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • December 2022

Categories

  • News
  • Technology
  • Uncategorized
eBlogTip
  • Categories
    • News
    • Technology
    • Domains
    • Hosting
    • Promotions
  • Technology

Hacking device Flipper Zero can spam nearby iPhones with Bluetooth pop-ups

  • September 5, 2023
Total
0
Shares
0
0
0

Thanks to a popular and relatively cheap hacking tool, hackers can spam your iPhone with annoying pop-ups prompting you to connect to a nearby AirTag, Apple TV, AirPods, and other Apple devices.

A security researcher who asked to be referred to as only Anthony demonstrated this attack using a Flipper Zero, a small device that can be programmed to perform wireless attacks on devices in its range, such as iPhones, but also car keyfobs, contactless and RFID cards, and more. Anthony’s attack is essentially a denial-of-service. By pushing persistent pop-ups, someone can make an iPhone nearly unusable.

Anthony told TechCrunch that he called it “a Bluetooth advertising assault.”

“It’s not just a minor inconvenience; it can disrupt the seamless experience that Apple users are accustomed to,” he wrote in a blog post explaining the issue.

Anthony said he tweaked the Flipper Zero firmware to broadcast what are called Bluetooth Advertisements, a type of transmissions in the Bluetooth Low Energy protocol that Apple uses to give iDevices owners the ability to connect to an Apple Watch, other Apple devices, and send pictures to other iDevice owners using the Bluetooth file sharing system AirDrop.

As Anthony put it, these are “broadcast signals that devices use to announce their presence and capabilities.”

Using a Flipper Zero, TechCrunch was able to reproduce this attack on an iPhone 8 and a newer iPhone 14 Pro.

TechCrunch tested the exploit by compiling the proof-of-concept code from the security researcher’s blog into a firmware software file, which we then loaded into a Flipper Zero device we have. Once we replaced the Flipper Zero’s firmware with our custom compiled code, simply switching on Bluetooth from the Flipper Zero device began broadcasting the pop-up signals to the nearby iPhones.

We used the proof-of-concept code to imitate a nearby AirTag, and the other code for transferring a phone number. Both tests worked, though we could not immediately reproduce the barrage of notifications. Using the proof-of-concept code, we tricked two nearby iPhones into thinking they were close to two AirTags, but found that the Bluetooth range was limited to close proximity, such as tapping the iPhone with the Flipper Zero. We also successfully tested the code designed to trick a nearby iPhone into displaying a phone number transfer dialog, but found that the Bluetooth range was far greater and captured multiple iPhones at the same time using a Flipper Zero on the other side of a room.

The exploits worked on iPhones both when Bluetooth was enabled or switched-off in the Control Center, but could not reproduce the exploit when Bluetooth was fully switched off from the Settings.

Security researchers have been focusing on highlighting how malicious hackers could abuse Bluetooth to annoy iPhone owners lately. During the Def Con hacking conference in Las Vegas in August, a researcher scared and confused attendees by making alerts pop-up on their iPhones. The researcher used a $70 contraption made of a Raspberry Pi Zero 2 W, two antennas, a Linux-compatible Bluetooth adapter, and a portable battery. Using this device, the researcher was able to mimic an Apple TV and spam nearby devices.

Anthony said that he devised an attack that can work over “thousands of feet,” using an “amplified board” that can broadcast Bluetooth packets at a higher range than regular Bluetooth Low Energy devices. Anthony said he is not releasing details of that technique “due to major concerns,” such as giving others the ability to send spam pop-ups “across vast distances, potentially spanning miles.”

The researcher said Apple could mitigate these attacks by ensuring the Bluetooth devices connecting to an iPhone are legitimate and valid, and also reducing the distance at which iDevices can connect to other devices using Bluetooth.

Apple did not respond to a request for comment.


Do you have information about similar hacks against iPhones? We’d love to hear from you. From a non-work device, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram and Wire @lorenzofb, or email [email protected]. You also can contact TechCrunch via SecureDrop.


Source link

Total
0
Shares
Share 0
Tweet 0
Pin it 0
Previous Article
  • Technology

FedNow will expose fintech’s gaps: Compliance-by-design can help banks avoid risk

  • September 5, 2023
View Post
Next Article
  • Technology

U.S. App Store downloads are dropping, new data indicates

  • September 5, 2023
View Post
You May Also Like
View Post
  • Technology

Lemurian Labs is building a new compute paradigm to reduce cost of running AI models

  • October 4, 2023
View Post
  • Technology

Docker launches remote container builds, new debugging tools and more

  • October 4, 2023
View Post
  • Technology

News app turned X competitor Artifact now lets users generate AI images for their posts

  • October 4, 2023
View Post
  • Technology

Google Assistant is getting AI capabilities with Bard

  • October 4, 2023
View Post
  • Technology

Google’s Pixel 8 brings new camera tricks, better display and a thermometer

  • October 4, 2023
View Post
  • Technology

Google’s Pixel Watch 2 brings new sensors for improved health tracking

  • October 4, 2023
View Post
  • Technology

Pixel 8 Pro’s upgraded camera system offers dream specs for mobile photographers

  • October 4, 2023
View Post
  • Technology

At One Ventures $375M new fund shows climate tech is still hot

  • October 4, 2023

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

eBlogTip.com
  • Categories

Input your search keywords and press Enter.