Malicious attackers can flood iPhone users with endless popups using a $170 tool

Posted:
in iPhone edited September 2023

Devices like the Flipper Zero can send out pre-programmed radio signals that can cause an iPhone to open a disruptive interface, effectively being attacked into temporary uselessness.

Not Your AirPods
Not Your AirPods



Apple products like the iPhone have various communication tools like Wi-Fi, Bluetooth, NFC, and Ultra Wideband to make pairing and using accessories easier. These tools are what make systems like AirDrop and fast AirPods pairing possible.

According to a report from TechCrunch, a security researcher asking to be identified as Anthony described an iPhone attack that could be described as a denial-of-service. By using something called a Flipper Zero, false radio signals can be sent out to nearby devices like iPhones to render them effectively useless.

Such an attack is possible for a number of products like Android, but the report focuses on iPhone. The attack is described as a mere annoyance to the user but could be used as a broader attack vector to push scams and other fraudulent pop-ups.

TechCrunch was able to reproduce the attack, but not the frequency of pop-ups that would render a device useless. Anthony also described a situation where an attacker could use an "amplified board" to project signals across "thousands of feet."

Right now, there isn't any mitigation for such an attack beyond shutting off the device or using airplane mode. The stakes are currently low -- the embedded video below refers to this as a "prank" -- but having the ability to broadcast a malicious signal to interrupt device usage could easily be abused.



The provided example imagines sending malicious pop-ups with scam links to users. One could also imagine a situation where an attacker could interrupt device use in a public area where propaganda is distributed over AirDrop.

Anyone who has been near someone fidgeting with their AirPods case may have encountered something similar previously -- incessant pop-ups of "Not Your AirPods" taking over your device display because of your proximity.

In testing, users stopped this attack by shutting off Bluetooth from the Settings app, not Control Center. However, Bluetooth isn't the only signal that could be abused.

Anthony suggests Apple needs to rethink its protocols around wireless signals. Instead of accepting any broadcast signal, Apple should have a verification system for confirming an incoming signal is valid while also shrinking the distance allowed for such communication.

Devices like the Flipper Zero aren't built and marketed as hacking devices or attack tools. However, since the code they run on is open source, skilled coders can rewrite them to perform different functions, even malicious ones.

While this is an interesting proof of concept, it isn't something general users need to defend themselves against actively. As always, users are the first line of defense and should be wary of unexpected pop-ups.

Read on AppleInsider

Comments

  • Reply 1 of 6
    chadbagchadbag Posts: 2,003member
    Of course Facebook has been force feeding me sponsored posts by the company selling this Flippet One device. 


    watto_cobra
  • Reply 2 of 6

    Speaking of tools, that guy sounds like one.  :|
    watto_cobra
  • Reply 3 of 6
    shrinking the distance allowed for such communication.


    So make wireless, less useful. Bluetooth is already short range, but they think it is a good idea to reduce it further?. How do you verify how far the device is, signal strength? Like that is reliable. Maybe a mode that allows only Apple devices or devices that were already connected, I wouldn't mind that. Then you could have a search mode for so many minutes, to allow for new devices.

    Alex1Nwatto_cobra
  • Reply 4 of 6
    The malware described in the article sounds like the tip of a very big iceberg. Denial of service attacks are annoying, sometimes crippling. But if people click on any of those pop-ups, even by accident, then the potential of identity and data theft start to appear. Then there's the possibility that further iterations of this intrusive malware will be able to pair with a phone without any action by the owner. That's when we start to see that spy movie trope, "just get me close enough and I'll clone it; they'll never know."
    Alex1Nwatto_cobra
  • Reply 5 of 6
    welshdogwelshdog Posts: 1,899member
    I hate hackers. Really just despise them.
    watto_cobra
  • Reply 6 of 6
    danoxdanox Posts: 2,948member
    This new style of attack (a variation of an old attack) probably grows out of the Israeli/American Secret Service, and Russian/Ukrainian conflict, and I bet there are plenty of prototypes of such attacks being developed for Electric Vehicles, and probably any other vehicle that broadcasts Bluetooth just for the hell of it, these attacks are the reason I prefer a wired connection from my phone/iPad to my car. This is just the tip of the iceberg.
    edited September 2023 watto_cobra
Sign In or Register to comment.