Categories: HackingSecurity

Mactans charger, a malicious hardware that could infect any Apple iOS devices

Mactans charger, this is the name of the malicious charger that will be presented by researchers at the Black Hat 2013 conference in July that is able to inoculate a malware in any Apple iOS devices.

Researchers from the Georgia Institute of Technology  announced the creation of Mactans charger, a custom wall charger for Apple iPhone and iPad that is able to inoculate a malware in any devices running any version of iOS.

The infection of device is possible through a chargers called Mactans that is based on BeagleBoard architecture. The BeagleBoard is a low-power open-source hardware single-board computer designed by Texas Instruments in association with Digi-Key that is sold to the public under the Creative Commons share-alike license.

An introduction of their presentation states that they will be able to demonstrate how an iOS device can be infected in less than a minute after plugging in a malicious charger.

“In this presentation, we demonstrate how an iOS device can be compromised within one minute of being plugged into a malicious charger. We first examine Apple’s existing security mechanisms to protect against arbitrary software installation, then describe how USB capabilities can be leveraged to bypass these defense mechanisms. To ensure persistence of the resulting infection, we show how an attacker can hide their software in the same way Apple hides its own built-in applications.”

The name Mactans derive by  is a highly venomous species of spider in the genus Latrodectus, the researchers Billy Lau, Yeongjin Jang, and Chengyu Song will present their creation at the Black Hat 2013 conference in July.

It’s not the first time we read about hardware disguised as everyday objects that are used to spy on networks, let’s remind the various researches promoted by DARPA that led to the design of objects able to penetrate the host network. This time Mactans charger is a circuit used to infect mobile users.

Once installed the malicious code with Mactans charger the researcher are also able to hide it exactly in the same way Apple does with its own built-in applications, the infection is possible due the exploit of a vulnerability already disclosed to Apple but that the company hasn’t yet fixed.

Apple in fact hasn’t yet  recognized the findings of the team, but the consequences of similar exploits are clear, potentially any iPhone or iPad could be compromised using its USB connection.

The researcher declared:

“The results were alarming: despite the plethora of defense mechanisms in iOS, we successfully injected arbitrary software into current-generation Apple devices running the latest operating system (OS) software. All users are affected, as our approach requires neither a jailbroken device nor user interaction.”

A last consideration relates to the possible impairment  of the supply chain of any hardware device and the need of hardware qualification… have you got an idea of what can be done exploiting the networks in our homes with compromised hardware.

Pierluigi Paganini

(Security Affairs – Hacking , Mactans charger )

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 84

Security Affairs Malware newsletter includes a collection of the best articles and research on malware…

14 minutes ago

Security Affairs newsletter Round 563 by Pierluigi Paganini – INTERNATIONAL EDITION

A new round of the weekly Security Affairs newsletter has arrived! Every week, the best…

46 minutes ago

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

21 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

22 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

1 day ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

2 days ago

This website uses cookies.