Accueil / Security vulnerability in the iPhone's USB-C port and a trap with iMessage phishing scams

Security vulnerability in the iPhone's USB-C port and a trap with iMessage phishing scams

14/01/2025 20:40:13
**Résumé:** Un vulnérabilité de sécurité a été découverte dans le contrôleur USB-C intégré des iPhones 15 et 16. Bien que l'exploitation de cette vulnérabilité soit extrêmement complexe, les chercheurs Apple et le détecteur Thomas Roth concluent qu'elle n'est pas une menace réelle. Cependant, un danger pour les utilisateurs d'iPhone existe dans un stratège utilisé par les scammers pour contourner une protection intégrée d'Apple. Les scammers peuvent tromper l'utilisateur en répondant à un message iMessage, même avec un simple "STOP", ce qui désactive la protection contre les liens phising. Pour se protéger : - N'ouvrez jamais un lien reçu par e-mail ou dans d'autres messages sans être invité spécifiquement. - Utilisez toujours vos propres marque-pages ou tapez manuellement les URL, uniquement si vous avez une bonne raison de croire que le message est authentique. - Doutez toujours et vérifiez avec la compagnie à l'aide des coordonnées connues avant d'agir.
Security vulnerability in the iPhone's USB-C port and a trap with iMessage phishing scams

A security vulnerability has been discovered in the built-in USB-C controller of the iPhone 15 and 16. However, exploiting this vulnerability would be so complex that both Apple and the security researcher who discovered it conclude that it is not a real threat in the real world.

However, a security concern that poses a danger to iPhone users is a strategy used by scammers to bypass one of Apple's built-in protections...

Security Vulnerability in the USB-C Port of the iPhone

The security researcher Thomas Roth discovered a vulnerability in the USB-C cable controller chip introduced for the first time in Apple's supply chain in 2023. In principle, it could be used to compromise an iPhone, as reported by Cyber Security News.

Security researchers have successfully hacked the proprietary ACE3 USB-C controller owned by Apple. This chip, introduced with the iPhone 15 and iPhone 15 Pro, represents a significant advancement in USB-C technology, managing power delivery and acting as a sophisticated microcontroller with access to critical internal systems [...]

The Roth group succeeded in executing code on the ACE3 processor. By carefully measuring electromagnetic signals during the processor's startup, they identified the exact moment when firmware validation occurred.

The use of an electromagnetic fault injection at this critical stage allows them to bypass validation checks and start a modified microprogram fix in the chip's processor.

In theory, this could give an attacker complete control over an iPhone.

However, it would require physical access to the device and is extremely difficult to implement. Macworld reports that Apple concluded it was not a real threat after examining the method used, and Roth agreed with this.

Tactic Used by Scammers via iMessage Can Bypass Protocols

SMS and iMessages are frequently used by scammers to send links designed for phishing attacks and to try to install malware on iPhones.

To protect against this, if you receive an iMessage from someone not in your contacts and with whom you have never exchanged messages, your iPhone automatically disables all the message links. They appear as plain text and cannot be touched.

However, scammers have found a way to bypass this. If they can convince you to respond to the message, even with a STOP command intended to instruct a legitimate sender not to send any more messages, then this protection is disabled.

BleepingComputer says that addressing them, even with a single character response, means that your iPhone considers them legitimate and unlocks their links.

Apple informed BleepingComputer that if a user responds to this message or adds the sender to their contact list, the links will be activated.

In recent months, BleepingComputer has observed an increase in SMS phishing activity trying to get users to respond to a text message so that the links can be reactivated.

The site showed examples of false texts claiming to come from the USPS and a highway company, each asking the person received to reply with Yes. This would activate the links.

It's quite common for me to find the example above simply by looking in my spam folder.

How to Protect Yourself

Never click on a link received via email or in other messages unless you are explicitly invited to do so. The best practice is always to use your own bookmarks or manually type URLs, and only if you have a good reason to believe the message is authentic. When in doubt, call or send a message to the company using known contact details to verify.

  • Here's how to protect against password reset attacks on an iPhone.
  • Apple shares how to protect your Apple ID, avoid scams and other frauds

Vous pourriez aimer