📅 July 31, 2009     🕐 2 minutes read

Charlie Miller Explains The Vulnerability of the iPhone And The Possibility of Being Hacked via SMS

Just as we had anticipated, Charlie Miller and Collin Mulliner, during the Black Hat Conference, spoke about the iPhone vulnerability, which can be easily hack through the SMS application.

Yesterday , FSMdotCOM told you to Pay Attention To SMS Messages Received After Thrusday 07.30.09. Your iPhone Might Get Hijacked . Just as we had anticipated, Charlie Miller and Collin Mulliner, during the Black Hat Conference, spoke about the iPhone vulnerability, which can be easily hack through the SMS application.

The points of substance, in short, were as follows:

1. The major issue is a security flaw involving SMS. Specifically, the hack can control an iPhone remotely, including your iPhone’s camera, Safari, and more. It can even send messages to friends in your address book, which is where this hack becomes scariest.

2. The hack works by sending you code in an SMS message (or a series of messages) that crashes your iPhone. After that, your iPhone is theirs to use.

3. The offending text would come in the form of a single square character. If you get the square character, turn off your phone IMMEDIATELY.

4. You only have to receive the message to get hacked; you don’t even have to do anything with the text message.

5. The flaw was discovered by noted security expert Charlie Miller, who has hacked everything from MacBook Airs to Second Life, and partner Collin Mullinger.

6. The attack was presented publicly at the Black Hat conference. The duo decided to do this after Apple gave them no response back in July, when they provided Apple with information on the security flaw. The goal is to bring attention to the flaw (which they are clearly getting).

7. According to Reuters, now that the vulnerability is exposed, hackers could build software that mounts this SMS attack within the next two weeks.

8. Apparently Google Android, Windows Mobile phones, and Palm Pres are vulnerable to similar hacks. The team demonstrated the attack on an Android phone and a Windows Mobile phone.

SUPPORT

FSM has no ads or affiliate links. Your support would simply pay for our servers, domain and maintanance. If there's any leftover change, we'll get some coffee and a slice of pizza. ​

Merch   FSM Goodies ( Alpha release )
PayPal  
Monero (XMR) 43GnqUNJrTi9QyL7kEH8vM8pgWGCE6bjv1FSRipeNMM4TTeNnUVsRBb6MfMpQYxtLE7ReonxVVSXz2rFCEdW5H11LC3x73b
Bitcoin (BTC) 1Hfuq77gKKFJeNcq4EP4dQK3yDRWrFEwJR
Bitcoin Cash (BCH) qzmdm6e6q5wf2p6sxz2mst7cenz60newwc5m4e9js8
Ether (ETH) 0x5f02869278C24A6579d3820f52AD15936D6F9d69
Stellar (XLM) GDWT2QU2CI3GZ5XH5DTSU3IUAHZMTB6VQKKRHBYWS5YCCQOAG6OKG2OB
More content?