Jailbroken idevices pwned by charging stations

Powered by SC Magazine
 

USB mode silently comes to life.

Data can be stolen from Windows, Android and Apple devices by unassuming power charging towers.

In an attack demonstrated at the Defcon hacking conference, mobile phone charging units were rigged to pull data from phones plugged into them.

They were laced with different power charging adaptors to make them more appealing.

Some stock phones were safe since they deactivated USB mode when they were powered off, but others were not so lucky.

Many jailbroken and modified devices activated USB functions when  they were plugged in, or simply rebooted.

That gave security researchers Brian Markus, Joseph Mlodzianowski and Robert Rowley the access they needed to pull data, though they instead served victims with a warning.

“If the phone died due to lack of power, in most cases the phone would boot up upon
plugging it in, then expose the data,” Marcus said.

Three hundred and sixty four people fell for the trick. Each was served with a message that warned of the dangers of using public power charging stations.

The researchers were still crunching over the findings, however Markus said specifications that may mean USB modes were silently actived included the platform and version of operating system and root kits and jailbreaks used, whether custom systems like Android ROMs were used, and the drivers loaded on the host.

Markus said the team was to his knowlegde the first to expose the threat, but said he was suspcious “of certain power kiosks”.

“Our goal is to promote security awareness.  While we do have several other variants of this demo that shows what could happen, we demo them in a responsible way.”

Copyright © SC Magazine, Australia


Jailbroken idevices pwned by charging stations
 
 
 
Top Stories
ANZ looks to life beyond the transaction
If digital disruptors think an online payments startup could rock the big four, they’ve missed the point of why people use banks, says Patrick Maes.
 
What InfoSec can learn from the insurance industry
[Blog post] Another way data breach laws could help manage risk.
 
A ten-point plan for disrupting security
[Blog post] How can you defend the perimeter when it’s in the cloud?
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest articles on BIT Latest Articles from BIT
Pass on carbon tax savings, warns ACCC
Jul 24, 2014
The ACCC is warning businesses that supply "regulated goods" to pass on any cost savings ...
Have customers that won't pay debts?
Jul 10, 2014
The ACCC and ASIC have updated their advice when it comes to collecting debts.
Carpet cleaner faces court over online testimonials
Jul 4, 2014
The ACCC has initiated proceedings against A Whistle (1979) Pty Ltd, the franchisor of Electrodry...
You can now get 15GB of free online storage using Microsoft OneDrive
Jun 25, 2014
Cloud storage has reached both the capacity and price where it's a viable alternative to local ...
Another clever trick you can perform with Xero
Jun 25, 2014
Here is another way to reach out to particular subsets of your customers using Xero.
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  29%
 
Application integration concerns
  3%
 
Security and compliance concerns
  27%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  21%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 1041

Vote