Brother
Professional
- Messages
- 2,590
- Reaction score
- 533
- Points
- 113
Hexway's research team was able to determine the user's phone number on an iPhone using AirDrop, a Wi-Fi and Bluetooth file transfer technology developed by Apple. According to hexway, they decided to test whether Apple's slogan "What happens on the iPhone stays on the iPhone" is true. The experts have already published the exploit on GitHub.
The researchers were able to intercept data packets transmitted by devices when Bluetooth was turned on. According to experts, AirDrop transmits encrypted packets with a phone number for the recipient to find in their contacts.
The experts described the stages of a potential attack: an attacker must create a database SHA256 (phone_number): phone_number for a specific region and run a special script, for example, on a laptop while in a public place. When someone tries to use AirDrop, an attacker can intercept the hash of the sender's phone number and recover the number from it. According to hexway, if you contact the user via iMessage, you can determine the name of the owner of the phone. The experts managed to find out the name using TrueCaller, and also found it in the device name.
The researchers also talked about an issue that may arise when using the Share Wi-Fi Password feature on an iPhone. The user needs to select a network from the list, and the device will start sending Bluetooth LE requests to other iPhones, asking them for a password. BLE broadband requests contain user data, namely the SHA256 hash of the phone number, AppleID, and email address. According to experts, only the first 3 bytes of hashes are sent, but that's enough to identify the phone number.
Hexway experts say the problem is not a vulnerability, but rather a consequence of features that power the Apple ecosystem. The described methods work in iOS 10.3.1 and higher, including beta versions of iOS 13. Experts also noted that older devices (all before iPhone 6s) do not send BLE messages continuously, even if they have updated the OS version. Only a limited number of messages are sent, probably Apple is doing this to conserve battery power on older devices.
According to the researchers, the only solution to the problem is to turn off Bluetooth on the device.
The researchers were able to intercept data packets transmitted by devices when Bluetooth was turned on. According to experts, AirDrop transmits encrypted packets with a phone number for the recipient to find in their contacts.
The experts described the stages of a potential attack: an attacker must create a database SHA256 (phone_number): phone_number for a specific region and run a special script, for example, on a laptop while in a public place. When someone tries to use AirDrop, an attacker can intercept the hash of the sender's phone number and recover the number from it. According to hexway, if you contact the user via iMessage, you can determine the name of the owner of the phone. The experts managed to find out the name using TrueCaller, and also found it in the device name.
The researchers also talked about an issue that may arise when using the Share Wi-Fi Password feature on an iPhone. The user needs to select a network from the list, and the device will start sending Bluetooth LE requests to other iPhones, asking them for a password. BLE broadband requests contain user data, namely the SHA256 hash of the phone number, AppleID, and email address. According to experts, only the first 3 bytes of hashes are sent, but that's enough to identify the phone number.
Hexway experts say the problem is not a vulnerability, but rather a consequence of features that power the Apple ecosystem. The described methods work in iOS 10.3.1 and higher, including beta versions of iOS 13. Experts also noted that older devices (all before iPhone 6s) do not send BLE messages continuously, even if they have updated the OS version. Only a limited number of messages are sent, probably Apple is doing this to conserve battery power on older devices.
According to the researchers, the only solution to the problem is to turn off Bluetooth on the device.
