Arab Press

بالشعب و للشعب
Saturday, May 31, 2025

Google engineer demonstrate how he could get full control and copy all data from 25 iPhones without touching them

iPhone security? Hmmm... In this demo I remotely trigger an unauthenticated kernel memory corruption vulnerability which causes all iOS devices in radio-proximity to reboot, with no user interaction. Over the next 30'000 words I'll cover the entire process to go from this basic demo to successfully exploiting this vulnerability in order to run arbitrary code on any nearby iOS device and steal all the user data

One of the geniuses working for Google on Project Zero wrote on his blogpost and on his YouTube videos:

Introduction
Quoting @halvarflake's Offensivecon keynote from February 2020:

"Exploits are the closest thing to "magic spells" we experience in the real world: Construct the right incantation, gain remote control over device."

For 6 months of 2020, while locked down in the corner of my bedroom surrounded by my lovely, screaming children, I've been working on a magic spell of my own. No, sadly not an incantation to convince the kids to sleep in until 9am every morning, but instead a wormable radio-proximity exploit which allows me to gain complete control over any iPhone in my vicinity. View all the photos, read all the email, copy all the private messages and monitor everything which happens on there in real-time.

The takeaway from this project should not be: no one will spend six months of their life just to hack my phone, I'm fine.

Instead, it should be: one person, working alone in their bedroom, was able to build a capability which would allow them to seriously compromise iPhone users they'd come into close contact with.

Imagine the sense of power an attacker with such a capability must feel. As we all pour more and more of our souls into these devices, an attacker can gain a treasure trove of information on an unsuspecting target.

What's more, with directional antennas, higher transmission powers and sensitive receivers the range of such attacks can be considerable.

I have no evidence that these issues were exploited in the wild; I found them myself through manual reverse engineering. But we do know that exploit vendors seemed to take notice of these fixes. For example, take this tweet from Mark Dowd, the co-founder of Azimuth Security, an Australian "market-leading information security business":

Watch the videos and read his full post here.

Newsletter

Related Articles

Arab Press
0:00
0:00
Close
Meta and Anduril Collaborate on AI-Driven Military Augmented Reality Systems
EU Central Bank Pushes to Replace US Dollar with Euro as World’s Main Currency
European and Arab Ministers Convene in Madrid to Address Gaza Conflict
Head of Gaza Aid Group Resigns Amid Humanitarian Concerns
U.S. Health Secretary Ends Select COVID-19 Vaccine Recommendations
Trump Warns Putin Is 'Playing with Fire' Amid Escalating Ukraine Conflict
India and Pakistan Engage Trump-Linked Lobbyists to Influence U.S. Policy
U.S. Halts New Student Visa Interviews Amid Enhanced Security Measures
Trump Administration Cancels $100 Million in Federal Contracts with Harvard
SpaceX Starship Test Flight Ends in Failure, Mars Mission Timeline Uncertain
King Charles Affirms Canadian Sovereignty Amid U.S. Statehood Pressure
Iranian Revolutionary Guard Founder Warns Against Trusting Regime in Nuclear Talks
Netanyahu Accuses Starmer of Siding with Hamas
Calls Grow to Resume Syrian Asylum Claims in UK
UAE Offers Free ChatGPT Plus Subscriptions to Citizens
Denmark Increases Retirement Age to 70, Setting a European Precedent
Iranian Director Jafar Panahi Wins Palme d'Or at Cannes
Israeli Airstrike Kills Nine Children of Gaza Doctor
Lebanon Initiates Plan to Disarm Palestinian Factions
Iran and U.S. Make Limited Progress in Nuclear Talks
Trump Administration's Tariff Policies and Dollar Strategy Spark Global Economic Debate
OpenAI Acquires Jony Ive’s Startup for $6.5 Billion to Build a Revolutionary “Third Core Device”
Turkey Weighs Citizens in Public as Erdoğan Launches National Slimming Campaign
UK Suspends Trade Talks with Israel Amid Gaza Offensive
Iran and U.S. Set for Fifth Round of Nuclear Talks Amid Rising Tensions
Russia Expands Military Presence Near Finland Amid Rising Tensions
Indian Scholar Arrested in Crackdown Over Pakistan Conflict Commentary
Israel Eases Gaza Blockade Amid Internal Dispute Over Military Strategy
President Biden’s announcement of advanced prostate cancer sparked public sympathy—but behind closed doors, Democrats are in panic
Mount Lewotobi Laki-Laki Erupts Again, Spewing Ash Cloud over Flores Island
Indian jet shootdown: the all-robot legion behind China’s PL-15E missiles
The Chinese Dragon: The True Winner in the India-Pakistan Clash
Australia's Venomous Creatures Contribute to Life-Saving Antivenom Programme
The Spanish Were Right: Long Working Hours Harm Brain Function
Did Former FBI Director Call for Violence Against Trump? Instagram Post Sparks Uproar
US and UAE Partner to Develop Massive AI Data Center Complex
Apple's $95 Million Siri Settlement: Eligible Users Have Until July 2 to File Claims
US and UAE Reach Preliminary Agreement on Nvidia AI Chip Imports
President Trump and Elon Musk Welcomed by Emir of Qatar Sheikh Tamim with Cybertruck Convoy
Strong Warning Issued: Do Not Use General Chatbots for Medical, Legal, or Educational Guidance
NVIDIA and Saudi Arabia Launch Strategic Partnership to Establish AI Centers
Trump Meets Syrian President Ahmad al-Shara in Historic Encounter
US and Saudi Arabia Sign Landmark Agreements Across Multiple Sectors
Why Saudi Arabia Rolled Out a Purple Carpet for Donald Trump Instead of Red
Elon Musk Joins Trump Meeting in Saudi Arabia
Trump says it would be 'stupid' not to accept gift of Qatari plane
Quantum Computing Threatens Bitcoin Security
Michael Jordan to Serve as Analyst for NBA Games
Senate Democrats Move to Censure Trump Over Qatar Jet Gift
Hamas Releases Last Living US Hostage from Gaza Amid Ongoing Conflict
×