Researchers from the Secure Mobile Networking Lab at the Technical University of Darmstadt have created a Proof of Concept (POC) attack for loading malware onto the Bluetooth chip of an iPhone while the phone is powered off. There are no reports of such an attack in the wild and no immediate threat is known. However, since Bluetooth, Near-field Communication (NFC), and ultra-wideband (UWB) chips remain active for features such as FindMyPhone and Apple Wallet, the POC demonstrates that malware can be loaded onto a device even when it is powered off, as long as the phone hardware has initiated Apple’s Low Power Mode (LPM). Attack vectors would require already established privileged access on the iPhone or a wireless exploitation such as BrakTooth.
Using Microsoft Sentinel to Detect Confluence CVE-2022-26134 Exploitation
By Akshay Rohatgi and Randy Pargman About this Student Research Project Binary Defense’s mission is