Tuesday , May 24 2016
Breaking News
Home / Mobile / Researchers to show how to install malware in iPhones, iPads with just a charger

Researchers to show how to install malware in iPhones, iPads with just a charger

How to install malware in iPhones, iPads

At the upcoming Blackhat Security Conference in July, three researchers plan to showcase a proof-of-concept that they claim can install malware into an Apple device that is plugged into it. The researchers claim that the charger can do this without requiring any permission, or even needing jailbreak on the device.

According to the summary of the talk, “despite the plethora of defense mechanisms in iOS, we successfully injected arbitrary software into current-generation Apple devices running the latest operating system (OS) software. All users are affected, as our approach requires neither a jailbroken device nor user interaction.”

The researchers—Billy Lau, Yeongjin Jang and Chengyu Song—will be demonstrating how an iOS device can be compromised within a minute of being plugged into a malicious wall charger at the presentation.

Another trend has evolved with the all new Lightening Connector

iPhones, iPads with just a charger

The presentation also includes an examination of Apple’s existing security measures that protect their devices against arbitrary software installation. After this, they will talk about how USB capabilities can be used to bypass the defenses. The researchers then show how to hide their software in the same way that Apple hides its own built-in apps so that the malicious app doesn’t get removed by any security mechanism of the device.

For the demonstration, the researchers made their own malicious charger, dubbed Mactans. It was made using a BeagleBoard, which is an open source single-board computer produced and sold by Texas Instruments.

The Matcans was built with a limited amount of time and a small budget, since the BeagleBoard costs around $45 (roughly Rs 2,541). It is worth thinking what a well motivated and well-funded malicious person could do with these ideas.

To top off the presentation, the researchers recommend some security measures to protect themselves and suggest features that Apple can implement to make the attacks from chargers substantially more difficult to execute.



  1. Within the movie “The Internet”, Sandra Bullock is really a computer nerd/hack who is employed by a security company troubleshooting infections, spying, etc. What’s her area of expert knowledge, may be the virus recognition she does within the opening scene real or perhaps a fake? Lastly, I do not recall exactly what the title from the area is or how it is known as, but could someone give good links to colleges that train this? Thanks ahead of time.

  2. Men, I am fed up with hunting for a forum which has the very best cyber-terrorist. Any assistance will be appreciate.

Leave a Reply

Your email address will not be published. Required fields are marked *