Jailbroken idevices pwned by charging stations

Powered by SC Magazine
 

USB mode silently comes to life.

Data can be stolen from Windows, Android and Apple devices by unassuming power charging towers.

In an attack demonstrated at the Defcon hacking conference, mobile phone charging units were rigged to pull data from phones plugged into them.

They were laced with different power charging adaptors to make them more appealing.

Some stock phones were safe since they deactivated USB mode when they were powered off, but others were not so lucky.

Many jailbroken and modified devices activated USB functions when  they were plugged in, or simply rebooted.

That gave security researchers Brian Markus, Joseph Mlodzianowski and Robert Rowley the access they needed to pull data, though they instead served victims with a warning.

“If the phone died due to lack of power, in most cases the phone would boot up upon
plugging it in, then expose the data,” Marcus said.

Three hundred and sixty four people fell for the trick. Each was served with a message that warned of the dangers of using public power charging stations.

The researchers were still crunching over the findings, however Markus said specifications that may mean USB modes were silently actived included the platform and version of operating system and root kits and jailbreaks used, whether custom systems like Android ROMs were used, and the drivers loaded on the host.

Markus said the team was to his knowlegde the first to expose the threat, but said he was suspcious “of certain power kiosks”.

“Our goal is to promote security awareness.  While we do have several other variants of this demo that shows what could happen, we demo them in a responsible way.”

Copyright © SC Magazine, Australia


Jailbroken idevices pwned by charging stations
 
 
 
Top Stories
Coalition's NBN cost-benefit study finds in favour of MTM
FTTP costs too much, would take too long.
 
Telcos finally briefed on data retention details
Update: AGD offers list of data to be stored.
 
Qld Health hires short-term CIO, CTO
Ray Brown leaves after five years at IT helm.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest articles on BIT Latest Articles from BIT
Looking for storage? Seagate has five new small business NAS devices
Aug 22, 2014
Seagate has announced a new portfolio of Networked Attached Storage (NAS) solutions specifically ...
Run a small business in western Sydney?
Aug 15, 2014
This event might be of interest if you're looking to meet other people with a similar interest ...
Buying a tablet? Microsoft's Surface Pro 3 goes on sale this month
Aug 8, 2014
Microsoft has announced its Surface Pro 3 will go on sale in Australia on 28 August from ...
Apple's top MacBook Pro with Retina is now cheaper
Aug 1, 2014
Apple has updated its MacBook Pro range with faster processors and new pricing, including ...
Pass on carbon tax savings, warns ACCC
Jul 24, 2014
The ACCC is warning businesses that supply "regulated goods" to pass on any cost savings ...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  67%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  12%
TOTAL VOTES: 560

Vote