‘Dangerous’ iPhone exploit code goes public

Yikes! This is actually an ugly situation. I wonder if Apple’s recent handling of PR has moved them away from “underdog” and instead made them a bit of target? App store rejection policy is random, ‘Antennagate’, it all makes them look a bit too much like 1990s MSFT! Won’t be long now until we start to see a sharp uptick in hacks and viruses specifically for Mac/iOS….that would be a shame…

Minutes after Apple issued a security update Wednesday, the maker of a 10-day-old jailbreak exploit released code that others
could put to use hijacking iPhones, iPod Touches and iPads.

“Comex,” the developer of JailbreakMe 2.0, posted source code for the hacks that leveraged two vulnerabilities in iOS and allowed iPhone owners to install unauthorized apps.

Apple patched the bugs earlier Wednesday.

The exploits that comex used to jailbreak the iOS could be used for other purposes, including delivering malicious payloads to grab control of iPhones, iPads , and iPod Touches. All that would be necessary is for hackers to dupe users into visiting a malicious Web site or persuading
them to click on a link in an e-mail or text message.

“Impressive. And dangerous,” said Mikko Hypponen , chief research officer at antivirus company F-Secure, on Twitter early today of the exploit code.

It may not be long before comex’s work is turned into a weapon for attacks that gain “root” access, or complete control, of
iPhones and iPads.

“@comex thanks, using it to make malicious s*** now,” bragged someone identified as “MTWomg” on Twitter shortly after comex published the source code.

Noted Mac vulnerability researcher Dino Dai Zovi, co-author of The Mac Hackers Handbook , chimed in with a warning of his own. “Now that @comex released his jailbreak source, any bets on how long before it is
ported to Metasploit?” Dai Zovi tweeted Wednesday.

Metasploit is the open-source penetration testing framework that some use as a hacking toolkit.

Apple did not patch 2007’s first-generation iPhone or iPod Touch yesterday, delivering the update only to the iPhone 3G or later
running the iOS 2.0 or later, and to the second-generation iPod Touch or later running iOS 2.1 or later. Lacking patches,
those early models may be vulnerable to attack.

Also possibly at risk: Mac OS X. Like iOS, Apple’s desktop operating system includes the FreeType font engine, which may be
vulnerable to the same or a similar exploit.

And users who have used comex’s code to jailbreak their iPhones have a decision to make. If they accept Wednesday’s update,
they lose the ability to install and run software not approved by Apple. But by ignoring the update, they may be victimized
by future attacks based on the public code.

Security experts urged everyone, jailbreakers included, to apply the update.

“We recommend that all iOS users, including those who have jailbroken their devices, would install the latest update now,”
Hypponen said in a blog post Wednesday.

Users can download the iOS update by connecting their iPhone, iPod Touch or iPad to their PC or Mac, running iTunes, clicking
on the device in the listing on the left and then clicking the “Check for Update” button.

Read more about macintosh in Computerworld’s Macintosh Topic Center.

Author: Joel Vincent

Growth Hacker and wine lover

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.