![]() ![]() ![]() The exploits worked on iPhones both when Bluetooth was enabled or switched-off in the Control Center, but could not reproduce the exploit when Bluetooth was fully switched off from the Settings. We also successfully tested the code designed to trick a nearby iPhone into displaying a phone number transfer dialog, but found that the Bluetooth range was far greater and captured multiple iPhones at the same time using a Flipper Zero on the other side of a room. Using the proof-of-concept code, we tricked two nearby iPhones into thinking they were close to two AirTags, but found that the Bluetooth range was limited to close proximity, such as tapping the iPhone with the Flipper Zero. Both tests worked, though we could not immediately reproduce the barrage of notifications. We used the proof-of-concept code to imitate a nearby AirTag, and the other code for transferring a phone number. Once we replaced the Flipper Zero’s firmware with our custom compiled code, simply switching on Bluetooth from the Flipper Zero device began broadcasting the pop-up signals to the nearby iPhones. ![]() TechCrunch tested the exploit by compiling the proof-of-concept code from the security researcher’s blog into a firmware software file, which we then loaded into a Flipper Zero device we have. Using a Flipper Zero, TechCrunch was able to reproduce this attack on an iPhone 8 and a newer iPhone 14 Pro. Example of 'DDOS: /5FGhK7QYoGĪnthony said he tweaked the Flipper Zero firmware to broadcast what are called Bluetooth Advertisements, a type of transmission in the Bluetooth Low Energy protocol that Apple uses to give iDevices owners the ability to connect to an Apple Watch, other Apple devices and send pictures to other iDevice owners using the Bluetooth file sharing system AirDrop.Īs Anthony put it, these are “broadcast signals that devices use to announce their presence and capabilities.” ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |