Vulnerability was found on iPhone that allows to simulate reboot and monitor users
Miscellaneous / / January 10, 2022
You think that the smartphone has gone into reboot, and at this time it can shoot video and download data.
Cybersecurity specialists from ZecOps have developed technology that simulates iPhone shutdown to steal data. It was named NoReboot. Its code remains on the device even after the iOS reboot, although it was previously believed that the OS is protected from this.
With NoReboot, attackers can theoretically spy on iPhone owners through a camera and microphone without showing themselves in any way. The system injects malicious code into three background processes: InCallService, SpringBoard, and backboardd. They are responsible for the process of rebooting Apple smartphones.
The use of NoReboot was shown in the video:
According to the researchers, when a hacker intercepts the reboot process, the user will think the device is shutting down. But in reality, the iPhone will remain active and connected to the Internet. Also, NoReboot can simulate the boot process so that the owner of the gadget does not suspect anything.
There is no patch that would help solve the problem with NoReboot - formally, the technology does not exploit errors in the iOS code. In order not to become a victim of such attacks, it is worth installing applications only from official stores, not clicking on dubious links, and observing other digital security rules.
Read also🧐
- Experts named the most popular mobile games and apps for 2021
- What to install on a new iPhone or iPad
- Best iOS App of 2021 by Lifehacker
For 10 years in IT I have tried a lot: I worked as a system administrator and a tester, wrote in a dozen different languages programming, led the computer department of the editorial board of the print newspaper and kept news feeds high-tech portals. I can patch KDE2 under FreeBSD - and tell in detail about all the nuances of this process. I dream about home R2-D2 and space flight.
For a sister with many children, a progressive grandmother and an introvert friend: 4 ideas for a technological gift that will delight anyone