Researchers from the Secure Mobile Networking Lab at the Technical University of Darmstadt have created a Proof of Concept (POC) attack for loading malware onto the Bluetooth chip of an iPhone while the phone is powered off. There are no reports of such an attack in the wild and no immediate threat is known. However, since Bluetooth, Near-field Communication (NFC), and ultra-wideband (UWB) chips remain active for features such as FindMyPhone and Apple Wallet, the POC demonstrates that malware can be loaded onto a device even when it is powered off, as long as the phone hardware has initiated Apple’s Low Power Mode (LPM). Attack vectors would require already established privileged access on the iPhone or a wireless exploitation such as BrakTooth.
12 Essentials for a Successful SOC Partnership
As cyber threats continue to impact businesses of all sizes, the need for round-the-clock security