iOS 16: Simulated flight mode as a hidden hack

iOS 16: Simulated flight mode as a hidden hack - Photo by Sten Ritterfeld on Unsplash

Share post

Jamf Threat Labs has developed a technique on iOS16 that can simulate airplane mode. In concrete terms, this means that hackers could exploit this opportunity to trick the victim into thinking that the device's flight mode is turned on. However, malware is working in the background.

The attacker actually installed an artificial flight mode (after successfully using an exploit on the device). This changes the user interface so that the airplane mode symbol is displayed and the Internet connection to all apps is interrupted - except the application that the hacker wants to use. The technology has probably not yet been exploited by malicious actors.

More safety thanks to flight mode?

Flight mode ensures that passengers can safely use their devices such as smartphones or laptops during a flight. However, flight mode is now not only used when traveling, but also to save the battery or to temporarily disconnect from our “always-on” world. Others expect additional privacy when flight mode is switched on, for example during confidential meetings or when visiting secure facilities.

But does turning on airplane mode actually lead to more security and privacy? Researchers at Jamf Threat Labs studied Apple's Airplane Mode and found that malicious hackers have the ability to maintain a cellular connection for an application even if the user believes they have Airplane Mode turned on.

How was airplane mode manipulated?

The researchers managed to change the underlying code so that the airplane mode symbol appears, but the Internet connection is still maintained for certain applications. In order to make the deception seem as real as possible, the following changes were made:

  • The airplane mode icon turns on.
  • The network connection or Wi-Fi icon will be grayed out.
  • When opening the browser, the error message appears that is expected when airplane mode is switched on (see image).

🔎 The display shows airplane mode, but in reality the malware app is active and accessing the Internet (Image: Jamf).

The researchers also managed to interrupt access to cellular data or Wi-Fi for all apps, while maintaining it for only a selected application. The user believes that airplane mode is activated and the Internet connection is interrupted, while hackers can still load or pull data from the device via selected applications.

The screenshot shows how the researchers transformed the message that typically triggers when mobile data access is blocked for certain apps (left) into a notification window that looks like the typical Airplane Mode message (right).

How could hackers exploit this vulnerability?

The Threat Labs team created a video showing how an attacker might use this technique in a surveillance attack. For example, if fake airplane mode is active - that is, the device indicates that it is in airplane mode - the attacker can activate the camera or microphone and live stream from the device without the user being aware of a breach.

More at Jamf.com

 


About Jamf

Focused on Apple for over 20 years, Jamf is now the only company in the world with a complete endpoint management and protection solution that ensures enterprise-level security, is easy to use and protects end-user privacy.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more