Protect Your Apple ID: Def Con 2023 Demo Reveals Bluetooth Vulnerabilities

2023-08-17 04:54:48

At the Def Con 2023 conference held earlier, security expert Jae Bochs demonstrated a special Bluetooth device to try to defraud the Apple ID information of participating iPhone users. This self-developed device consists of a Rasperry Pi Zero 2W computer, two sets of antennas, a Bluetooth socket corresponding to Linux, and a mobile power supply. Bochs said that the cost is regarding US$70 (regarding HK$548), and the effective range is regarding 15 meters. The cost is only $70. Bochs walks around the venue with a special Bluetooth device, and uses Apple’s Bluetooth LE protocol to send a signal to the nearest iPhone, popping up a reminder that the simulated Apple TV is nearby. Bochs said he has a way to collect and store an iPhone user’s Apple ID or password if they follow a spoofed signal. In addition to simulating Apple TV, it can theoretically also simulate other devices using Bluetooth LE, such as AirTag or AirPods Pro. Using the Apple Bluetooth vulnerability, he conducted this experiment at Def Con 2023 for two main purposes. The first is to once once more expose the related vulnerabilities of Apple’s Bluetooth LE protocol. Research has discovered this problem as early as 2019, but Apple has not been serious regarding it. solve. The second is to remind iPhone users that turning off Bluetooth in the control center is not completely disabled. Users must manually turn it off in the settings page to actually disable Bluetooth. Source: techtimes
1692258481
#Selfprotection #methodSecurity #experts #bluetooth #devices #demonstrate #defraud #iPhone #user #passwordsePrice.HK

Leave a Replay