Exploring How iMessage Scams Attempt to Circumvent Apple’s Safeguards

0
19
Exploring How iMessage Scams Attempt to Circumvent Apple’s Safeguards

A security flaw has been identified in the USB-C port controller found in the iPhone 15 and 16 models. Nevertheless, exploiting this flaw is exceedingly complex, leading both Apple and the researcher who uncovered it to determine that it does not pose a real-world risk.

In contrast, a security issue that does endanger iPhone users involves a method that scammers use to circumvent one of Apple’s built-in defenses…

Security Flaw in iPhone’s USB-C Controller

Security expert Thomas Roth has discovered a vulnerability within the USB-C controller chip that was integrated into Apple’s supply chain in 2023. As noted by Cyber Security News, it theoretically could be exploited to compromise an iPhone.

Security researchers managed to breach Apple’s proprietary ACE3 USB-C controller. This chip, introduced with the iPhone 15 and 15 Pro, marks a significant advancement in USB-C technology, enabling power delivery and functioning as a sophisticated microcontroller with access to crucial internal systems […]

[Roth’s team successfully achieved] code execution on the ACE3 chip by meticulously measuring electromagnetic signals during the chip’s startup phase, allowing them to pinpoint the exact moment when firmware validation took place.

Through the use of electromagnetic fault injection at this key moment, they effectively disregarded the validation checks and initiated a modified firmware patch into the chip’s CPU.

Theoretically, this could grant an attacker complete control over an iPhone.

However, performing such an attack would necessitate physical access to the device, making it exceedingly challenging to execute. According to Macworld, after analyzing the employed method, Apple decided it wasn’t a credible threat, a sentiment echoed by Roth.

Techniques Used by iMessage Scammers to Bypass Protections

Scammers frequently utilize SMS and iMessages to send links designed for phishing attacks and to attempt installing malware on iPhones.

To safeguard users against this, if you receive an iMessage from someone not in your contacts and with whom you’ve never previously communicated, your iPhone automatically disables any links in the message. They will be displayed as plain text and cannot be clicked.

Nonetheless, scammers have devised a method to evade this protection. If they manage to persuade you to respond to the message, even with a simple STOP command meant to instruct a legitimate sender to cease further messages, this safeguard is rendered ineffective.

BleepingComputer reports that just the act of replying—no matter how brief—signals to the iPhone that the sender is legitimate, thereby allowing the links to be activated.

Apple informed BleepingComputer that once a user replies to the message or adds the sender to their contact list, the links will be activated.

In recent months, BleepingComputer has observed a surge in smishing attacks that seek to trick recipients into replying to a message to re-enable links.

The site showcased examples of false messages impersonating USPS and a toll road service, each urging the recipient to reply with a “Y”, which would activate the links.

This tactic is prevalent enough that I found an example to photograph by simply checking my deleted messages folder.

How to Safeguard Yourself

Never click on a link received via email or other messages unless you were expecting it. The best practice is to use only your own bookmarks or manually type URLs, and only do so if you have strong reasons to believe the message is genuine. If uncertain, reach out to the company using known contact details to confirm.

Photo: DMN

FTC: We incorporate income-generating auto affiliate links. More.

upgraded banner