A security researcher has been able to hack Apple’s USB-C controllers that are used in current iPhones, which would usually raise concerns about security and the ability to jailbreak the iPhone. But there’s probably nothing to worry about.
The vulnerability is in the ACE3 USB controller, which Apple introduced with the iPhone 15 lineup in 2023. Cyber Security News reports that researcher Thomas Roth used his knowledge of the previous controller, the ACE2, as the basis to hack the latest controller, using “a combination of reverse engineering, RF side-channel analysis, and electromagnetic fault injection.” Roth and his team were able to bypass the ACE3’s validation checks and install a modified patch into the CPU.
Apple’s controller is more complex than typical USB controllers, handling charging and data transfers, which makes it a target for hackers. However, Roth told Forbes that when he reported the issue to Apple, the company told him that the attack was so complex that they didn’t see it as a threat, and Roth agreed with Apple’s stance.
Roth presented his findings at the Chaos Communication Congress last December and it was recently reported by several security outlets. However, Roth presented his findings as early as last June at the Offensive Security Conference. A recording of Roth’s June presentation is available on YouTube; it appears to be the same as the December CCC presentation.
How to protect yourself from hacker attacks
As Apple and Roth state, this attack is so complicated that users don’t need to be concerned about it. If a hacker were to exploit this vulnerability, they would need to have physical access to your iPhone. Apple has protections in place within its operating systems and the company releases security patches through OS updates, so it’s important to install them when they are available.
Macworld has several guides to help, including a guide on whether iPhones are virus-proof, how to remove a virus from an iPhone or iPad, whether or not you need antivirus software, a list of Mac viruses, malware, and trojans, and a comparison of Mac security software.
Source : Macworld