Incident: iPhone Always-On Mechanism Exploited for Persistent Malware.

Published Date: 2022-05-17

Postmortem Analysis
Timeline 1. The software failure incident described in the article happened last week, as mentioned in the article. 2. Published on 2022-05-17. 3. The software failure incident occurred in May 2022.
System 1. iPhone's Bluetooth chip [128141] 2. Low-power mode (LPM) implementation on Apple iPhones [128141]
Responsible Organization 1. The researchers at Germany’s Technical University of Darmstadt were responsible for causing the software failure incident by exploiting the lack of hardening in the iPhone's Bluetooth chip [128141].
Impacted Organization 1. iPhone users were impacted by the software failure incident described in the article [128141].
Software Causes 1. Exploitation of the lack of hardening in the iPhone's Bluetooth chip firmware, allowing for the running of malicious firmware even when the device is turned off [128141].
Non-software Causes 1. Lack of hardening in the iPhone's Bluetooth chip firmware [128141] 2. Design flaws in the low-power mode (LPM) implementation on Apple iPhones [128141]
Impacts 1. The software failure incident allowed researchers to exploit the iPhone's always-on mechanism to run malware even when the device appears to be powered down, potentially compromising user privacy and security [128141]. 2. The lack of hardening in the iPhone's Bluetooth chip firmware enabled attackers to track the phone's location or run new features when the device is turned off, highlighting a significant security vulnerability [128141]. 3. The exploit targeting the low-power mode (LPM) in iOS could potentially be used in post-exploit scenarios by sophisticated malware like Pegasus, increasing the risk of surveillance and espionage activities by governments worldwide [128141]. 4. Firmware infections resulting from the software failure incident are extremely difficult to detect, requiring significant expertise and expensive equipment, which could lead to prolonged undetected malware operations on affected devices [128141]. 5. The incident exposed a double-edged sword in the security features enabled by LPM, showcasing the ongoing challenge for manufacturers to balance functionality with potential security risks introduced by new features [128141].
Preventions 1. Implementing digital signing or encryption mechanisms for the firmware running on the iPhone's Bluetooth chip could have prevented the software failure incident described in the article [128141]. 2. Conducting thorough security assessments and testing of the low-power mode (LPM) features introduced in iOS 15 to identify and address potential vulnerabilities before deployment could have helped prevent the incident. 3. Regularly updating the firmware and security features of the iPhone to patch any discovered vulnerabilities and enhance overall system security could have mitigated the risk of such software failures. 4. Enhancing collaboration and communication between researchers, security experts, and Apple engineers to address and resolve security concerns identified in academic research could have proactively prevented the incident.
Fixes 1. Implementing a mechanism for digitally signing or encrypting the firmware running on the iPhone's Bluetooth chip to prevent exploitation [128141].
References 1. Researchers at Germany’s Technical University of Darmstadt [Article 128141] 2. Apple engineers who reviewed the research paper [Article 128141] 3. John Loucaides, senior vice president of strategy at firmware security firm Eclypsium [Article 128141]

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization, multiple_organization (a) The software failure incident related to the abuse of the iPhone's always-on mechanism to run malware has happened within the same organization, Apple. Researchers discovered a way to exploit the lack of hardening in the iPhone's Bluetooth chip firmware to run malicious firmware even when the device is turned off [128141]. (b) The software failure incident related to the exploitation of the iPhone's always-on mechanism to run malware could potentially impact other organizations or devices as well. The researchers highlighted that similar attacks could be possible on Android devices if security flaws susceptible to over-the-air exploits are discovered [128141].
Phase (Design/Operation) design, operation (a) The software failure incident related to the design phase is evident in the article. Researchers at Germany’s Technical University of Darmstadt discovered a vulnerability in the iPhone's Bluetooth chip, which lacks mechanisms for digitally signing or encrypting the firmware it runs. This design flaw allowed attackers to exploit the always-on mechanism to run malware that remains active even when the iPhone appears to be powered down [128141]. (b) The software failure incident related to the operation phase is highlighted in the article as well. The researchers pointed out that the current low-power mode (LPM) implementation on Apple iPhones is opaque and adds new threats. They mentioned that the implementation within the Bluetooth firmware is not secured against manipulation, which could lead to malware running while the iPhone is turned off. Additionally, the article mentions that firmware infections are extremely difficult to detect since it requires significant expertise and expensive equipment, indicating challenges in detecting and mitigating such operational failures [128141].
Boundary (Internal/External) within_system, outside_system (a) The software failure incident described in the articles is within_system. Researchers discovered a way to abuse the always-on mechanism of iPhones to run malware that remains active even when the device appears to be powered down. This exploit involves manipulating the low-power mode (LPM) in the iPhone's hardware, specifically targeting the Bluetooth chip, to run malicious firmware [128141]. The lack of hardening in the Bluetooth chip's firmware allows attackers to track the phone's location or run new features even when the device is turned off. This vulnerability within the system poses a significant security risk as it enables malware to operate stealthily and persistently on the device. (b) The software failure incident is also influenced by outside_system factors. The potential for exploiting the always-on feature in iOS, as demonstrated by the researchers, could be leveraged in post-exploit scenarios by sophisticated smartphone exploit tools like Pegasus from the NSO Group. Additionally, if hackers discover security flaws susceptible to over-the-air exploits, similar to those seen in Android devices, they could infect the iPhone's chips remotely [128141]. These external factors, such as the availability of advanced exploit tools and vulnerabilities in other systems, contribute to the overall risk landscape surrounding the software failure incident.
Nature (Human/Non-human) non-human_actions (a) The software failure incident in the articles is related to non-human actions. Researchers discovered a way to abuse the always-on mechanism in iPhones to run malware that remains active even when the device appears to be powered down. This exploit takes advantage of the lack of hardening in the iPhone's Bluetooth chip firmware, allowing attackers to track the phone's location or run new features when the device is turned off [128141]. (b) The software failure incident in the articles is not directly related to human actions. However, it is mentioned that infections required first jailbreaking an iPhone, which is a difficult task, particularly in an adversarial setting. Additionally, the possibility of hackers discovering security flaws susceptible to over-the-air exploits similar to those targeting Android devices is mentioned, which could potentially introduce human actions as contributing factors in the future [128141].
Dimension (Hardware/Software) hardware, software (a) The software failure incident in the articles is related to hardware. Researchers found a way to abuse the always-on mechanism in iPhones to run malware even when the device appears to be powered down. This abuse is possible due to the lack of hardening in the iPhone's Bluetooth chip firmware, allowing attackers to track the phone's location or run new features when the device is turned off [128141]. (b) The software failure incident is also related to software. The researchers discovered vulnerabilities in the low-power mode (LPM) implementation on Apple iPhones, which allows chips responsible for communication to run in a special mode even after the device is turned off. This lack of security in the software implementation of LPM poses a risk by enabling malware to run while the iPhone is turned off [128141].
Objective (Malicious/Non-malicious) malicious (a) The software failure incident described in the articles is malicious in nature. Researchers discovered a way to abuse the always-on mechanism in iPhones to run malware that remains active even when the device appears to be powered down. This exploit allows attackers to track the phone's location or run new features when the device is turned off. The lack of hardening in the iPhone's Bluetooth chip firmware was exploited to achieve this, highlighting a security vulnerability that could be used for malicious purposes [128141].
Intent (Poor/Accidental Decisions) poor_decisions (a) The intent of the software failure incident related to poor_decisions: The software failure incident described in the articles is related to poor decisions made in the design and implementation of the iPhone's low-power mode (LPM) feature. The lack of digital signing or encryption in the Bluetooth chip's firmware allowed researchers to exploit this vulnerability and run malicious firmware even when the iPhone appears to be powered down. The researchers highlighted that the design of LPM features seemed to be mostly driven by functionality without considering threats outside of the intended applications, leading to potential security risks. Additionally, the researchers pointed out that Apple engineers reviewed their paper before publication, but the company did not provide any feedback on its contents, indicating a lack of proactive response to the identified security issues [128141].
Capability (Incompetence/Accidental) development_incompetence, unknown (a) The software failure incident related to development incompetence is evident in the article as researchers at Germany’s Technical University of Darmstadt discovered a way to exploit the lack of hardening in the iPhone's Bluetooth chip firmware, allowing for the running of malicious firmware even when the device is turned off [128141]. This exploitation highlights a significant security vulnerability that was not adequately addressed during the development process, indicating a failure due to contributing factors introduced by a lack of professional competence in ensuring the security of the firmware. (b) The software failure incident related to accidental factors is not explicitly mentioned in the provided article.
Duration temporary The software failure incident described in the articles can be categorized as a temporary failure. The incident involves a vulnerability in the iPhone's Bluetooth chip that allows for the running of malicious firmware even when the device appears to be powered down. This vulnerability is a result of exploiting the lack of hardening in the firmware of the Bluetooth chip, enabling attackers to track the phone's location or run new features when the device is turned off [128141]. The exploitation of this vulnerability requires specific circumstances, such as jailbreaking the iPhone, which is a difficult task, particularly in an adversarial setting. Additionally, the firmware infections targeting the low-power mode (LPM) of the iPhone chips are described as extremely difficult to detect, requiring significant expertise and expensive equipment [128141].
Behaviour other (a) crash: The software failure incident described in the articles does not involve a crash where the system loses state and does not perform any of its intended functions. The incident involves a security vulnerability that allows malware to run on iPhones even when they appear to be powered down [128141]. (b) omission: The incident does not involve a failure due to the system omitting to perform its intended functions at an instance(s). Instead, it focuses on a security vulnerability that allows malicious firmware to run on iPhones even when they are turned off [128141]. (c) timing: The incident is not related to a failure due to the system performing its intended functions correctly but too late or too early. It is centered around a security vulnerability that allows malware to remain active on iPhones even when they are seemingly powered down [128141]. (d) value: The software failure incident does not involve a failure due to the system performing its intended functions incorrectly. Instead, it pertains to a security vulnerability that enables malicious firmware to run on iPhones even when they are turned off [128141]. (e) byzantine: The incident does not exhibit a byzantine behavior where the system behaves erroneously with inconsistent responses and interactions. It is primarily about a security vulnerability that allows for the execution of malicious firmware on iPhones even when they are supposedly powered down [128141]. (f) other: The behavior of the software failure incident can be categorized as a security vulnerability that enables the execution of malware on iPhones even when they are turned off. This behavior is not explicitly covered in the options (a) to (e) provided [128141].

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence no_consequence, theoretical_consequence The consequence of the software failure incident discussed in the articles is primarily a "theoretical_consequence" as potential consequences were discussed but not observed. The researchers highlighted the risks posed by the chips running in low-power mode on iPhones, such as allowing malware to run while the device is turned off and potentially enabling stealthy operations. They also mentioned the difficulty in detecting firmware infections and the possibility of over-the-air exploits similar to those seen on Android devices. Additionally, the researchers pointed out that the findings have limited real-world value as infecting iPhones required jailbreaking, which is a challenging task. Overall, the articles did not report any real observed consequences like death, harm, basic needs impact, property loss, delays, or non-human entities being affected due to the software failure incident [128141].
Domain information, finance (a) The failed system in the reported incident was related to the information industry, specifically affecting iPhone users. The incident involved a vulnerability in the iPhone's Bluetooth chip that allowed for the exploitation of the always-on mechanism to run malware even when the device appeared to be powered down [Article 128141]. This vulnerability posed a risk to the security of iOS devices and highlighted potential threats associated with chips running in low-power mode. (h) The incident also has implications for the finance industry, as malware running on iPhones could potentially be used for post-exploit scenarios by sophisticated smartphone exploit tools like Pegasus, developed by the NSO Group. Governments worldwide employ such tools for espionage purposes, indicating a potential threat to financial data and transactions on compromised devices [Article 128141]. (m) Additionally, the software failure incident could impact other industries beyond those explicitly mentioned. The exploitation of the iPhone's always-on mechanism highlights the broader issue of firmware vulnerabilities and the challenges associated with detecting and mitigating such threats. This incident underscores the importance of considering security implications across various industries that rely on mobile devices for information exchange and financial transactions [Article 128141].

Sources

Back to List