On June 23, June 4, the George Institute of Technology Security research team just found a way to write information to iOS devices through a modified charger. They said the improved Charger could upload any data to the device within one minute after the iOS device is connected. The researchers said that all iOS users are at this risk, so that illegal operations do not require any user interaction. Hackers can even hide the applications on the device so that they are not displayed in the Application List.
According to researchers, all users are at risk because hackers do not need to interact with users. Hackers can even hide applications so that they are not displayed in the Device Application List. The charger itself is a small volume, based on the micro Linux PC named BeagleBone. Therefore, it is unlikely to be implanted into a normal iPhone or iPad charger, but it is difficult to protect the future.
The authenticity of this discovery is unknown. By default, Apple's iOS devices use the "sandbox" Security Mechanism to install and run only applications with valid digital signatures. However, it is said that the new tool can easily bypass Apple's security defense system.
Security researchers at Georgia Institute of Technology will present the charger at the July Black Hat Security Conference to demonstrate their findings. The researchers will detail how to use USB to bypass Apple's defense mechanism and provide apple with a solution to defend against this attack.