Pwning Androids, iPhones with Exchange

Powered by SC Magazine
 

Wipe phones, steal data and cause mayhem with ActiveSync.

View larger image View larger image View larger image

See all pictures here »

An attacker can steal your contacts, snoop on your email and erase all data from your iPhone or Android using Microsoft Exchange, a Perth university lecturer has revealed.

Peter Hannay discovered that by pushing policy to phones he could wipe the devices clean and likely steal data and sniff outgoing emails.

“There is nothing technically difficult to this – it's really easy and really lame, and that's a problem,” the Edith Cowan researcher told delegates at the Kiwicon security conference. 

Kiwicon 6 coverage

“We can set a minimum length for device passwords, demand as the server that a 65,500-long character password be set … and set the screen lock to a one second timeout and give one password attempt.”

“And we pushed a WiFi [ban] out to a WiFi-only iPad.”

In a proof-of-concept demonstration also shown at Defcon, Hannay used a WiFi Pineapple with DNS spoofing plus a fake certificate to which victim phones would connect.

Victim iPhones would flag a connection warning of which “nine out of 10 CEOs will click through” before the devices would be wiped.

“The problem is that we are giving users ... the ability to turn off security measures and they have been trained for years to bypass these sorts of errors,” Hannay said.

Microsoft's Windows Phone was not vulnerable to the attack.

Hannay along with a crew of Edith Cowan university students were further developing the research to include a protocol library to emulate the ActiveSync Protocol. 

“We may be able to get the phones to sync address books, contacts and so on. We could … push a new outgoing mail server to devices so that from now on whenever you send an email, it comes through us.”

He said the attack would gather a lot of victims in public areas such as airports.

Hannay also said when analysing a recent iteration of Android, he discovered Google Apps for business could also push policies following fallible reverse DNS checks.

Copyright © SC Magazine, Australia


 
 
 
Top Stories
Westpac interim CIO resigns
Group CIO yet to be appointed.
 
Earning the right to innovate
Breaking down the barriers to innovation is a long, but rewarding process, says Bank of Queensland Group CIO, Julie Bale.
 
A call for timely reporting
[Blog post] Businesses need incentives to keep customer data secure.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest articles on BIT Latest Articles from BIT
Have customers that won't pay debts?
Jul 10, 2014
The ACCC and ASIC have updated their advice when it comes to collecting debts.
Carpet cleaner faces court over online testimonials
Jul 4, 2014
The ACCC has initiated proceedings against A Whistle (1979) Pty Ltd, the franchisor of Electrodry...
You can now get 15GB of free online storage using Microsoft OneDrive
Jun 25, 2014
Cloud storage has reached both the capacity and price where it's a viable alternative to local ...
Another clever trick you can perform with Xero
Jun 25, 2014
Here is another way to reach out to particular subsets of your customers using Xero.
Have a phone, tablet and laptop?
Jun 20, 2014
This new Telstra pre-paid 4G mobile hotspot might be useful if you regularly need to use fast ...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  26%
 
Application integration concerns
  3%
 
Security and compliance concerns
  28%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  22%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  5%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 888

Vote