Security

Apple warns 'extremely sophisticated attack' may be targeting iThings

Cupertino mostly uses bland language when talking security, so this sounds nasty


Apple has warned that some iPhones and iPads may have been targeted by an “extremely sophisticated attack” and has posted patches that hopefully prevent it.

The patches fix a flaw in USB Restricted Mode, a feature Apple introduced in 2018 and which disables the Lightning or USB ports on iPhones and iPads if they’re locked for more than hour. Apple locks the ports to prevent attacks that involve connecting a cable to the ports. Once a user authenticates and unlocks a device, the ports come back to life.

Now it appears such attacks remain a possibility, as Apple on Monday issued the following advice:

A physical attack may disable USB Restricted Mode on a locked device. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals

That’s unusually vivid language for an Apple advisory, as Cupertino usually uses terms like "may have been actively exploited" to describe flaws it feels may have been targeted by attackers.

The National Institute of Standards and Technology’s assessment of the flaw describes it as “An authorization issue [that] was addressed with improved state management.”

Whatever the nature of the bug, Apple has fixed it in iOS 18.3.1, iPadOS 18.3.1 and iPadOS 17.7.5. The updates are available for the iPhone XS and later, and plenty of iPad pro, iPad Air, iPad Mini, and vanilla iPad models.

Apple’s mobile devices have been compromised with physical attacks before, sometimes using commercial tools from Israeli outfit Cellebrite which promotes its wares as helping law enforcement agencies to speed investigations.

For nearly a decade, Cellebrite has helped to open locked devices so they can be used in evidence. The company is very good: after last year's attempted assassination of now-President Trump, Cellebrite managed to crack the shooter's Android phone in 40 minutes.

Apple makes much of its privacy and security features, but also promotes itself as a good corporate citizen that’s as keen as anyone to crack down on crime. That makes its relationship with vendors like Cellebrite delicate. We asked Apple for details and haven’t received a response at the time of publication.

The flaws fixed by today’s patches were spotted by Bill Marczak, a senior researcher at the Citizen Lab, run within the University of Toronto. "Update your iPhones.. again! iOS 18.3.1 out today with a fix for an ITW [in the wild] USB restricted mode bypass," he warned. ®

Send us news
23 Comments

The software UK techies need to protect themselves now Apple's ADP won’t

No matter how deep you are in Apple's 'ecosystem,’ there are ways to stay encrypted in Blighty

Apple promises to spend $500B, hire 20K over 4 years to swerve Trump import tariffs

Sorry, that should read: Boost US manufacturing and R&D, believe in the American people, etc etc

Watchdog ponders why Apple doesn't apply its strict app tracking rules to itself

Germany's Federal Cartel Office voices concerns iPhone maker may be breaking competition law

Rather than add a backdoor, Apple decides to kill iCloud encryption for UK peeps

Plus: SEC launches new crypto crime unit; Phishing toolkit upgraded; and more

Wozniak: I didn't reduce chip count for manufacturing. I wanted to prove I was clever

Plus: Beware of a hotspot called 'spanky'

Ransomware criminals love CISA's KEV list – and that's a bug, not a feature

1 in 3 entries are used to extort civilians, says new paper

Are you cooler than ex-Apple design guru Sir Jony Ive?

What is it with high-powered execs and their love for U2?

US Cyber Command reportedly pauses cyberattacks on Russia

PLUS: Phishing suspects used fishing gear as alibi; Apple's 'Find My' can track PCs and Androids; and more

Wallbleed vulnerability unearths secrets of China's Great Firewall 125 bytes at a time

Boffins poked around inside censorship engines – here's what they found

MITRE Caldera security suite scores perfect 10 for insecurity

Is a trivial remote-code execution hole in every version part of the training, or?

Critical flaws in Mongoose library expose MongoDB to data thieves, code execution

Bugs fixed, updating to the latest version is advisable

Does terrible code drive you mad? Wait until you see what it does to OpenAI's GPT-4o

Model was fine-tuned to write vulnerable software – then suggested enslaving humanity