The malicious plug-in: A charger that can hack any Apple iOS device
Researchers develop Mactans, which installs malware as soon as it is plugged in
Your support helps us to tell the story
From reproductive rights to climate change to Big Tech, The Independent is on the ground when the story is developing. Whether it's investigating the financials of Elon Musk's pro-Trump PAC or producing our latest documentary, 'The A Word', which shines a light on the American women fighting for reproductive rights, we know how important it is to parse out the facts from the messaging.
At such a critical moment in US history, we need reporters on the ground. Your donation allows us to keep sending journalists to speak to both sides of the story.
The Independent is trusted by Americans across the entire political spectrum. And unlike many other quality news outlets, we choose not to lock Americans out of our reporting and analysis with paywalls. We believe quality journalism should be available to everyone, paid for by those who can afford it.
Your support makes all the difference.Researchers from the Georgia Institute of Technology have created a “malicious charger” able to hack any iOS device simply by plugging it in.
The group constructed the device by examining Apple’s existing security before realising how the USB capabilities “can be leveraged to bypass these defence mechanisms.”
Once the charger, dubbed ‘Mactans,’ has been plugged in, it is able to install hidden malware onto iPhones and iPads, allowing for any number of exploits of users’ hardware and their data.
The researchers described how the device was built with a “limited amount of time and a small budget”, adding that they also considered “what more motivated, well-funded adversaries could accomplish.”
The Mactans uses a tiny computer named a BeagleBoard (it measures 75x75mm and costs only £30) to complete the exploit with the group reporting that “all users are affected, as our approach requires neither a jailbroken device nor user interaction.”
The report comes from the conference notes for Black Hat, a security conference taking place in late July. The proof-of-concept device will be displayed at the conference, with the team of three also detailing how “to ensure persistence of the resulting infection” by hiding malicious software “in the same way Apple hides its own built-in applications.”
Join our commenting forum
Join thought-provoking conversations, follow other Independent readers and see their replies
Comments