TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Tiny device is sending updated iPhones into a never-ending DoS loop

53 pointsby netfortiusover 1 year ago

20 comments

ChrisArchitectover 1 year ago
Previous discussion a few weeks ago: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=37919396">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=37919396</a>
kstrauserover 1 year ago
I&#x27;ve installed the &quot;little tool&quot; on my Flipper Zero and confirmed that it does, in fact, crash my iPhone.<p>I know I&#x27;m preaching to the choir here on this site, but as a reminder, the tool only exposes a bug that was already there. It&#x27;s an exploit for an existing problem. I&#x27;m glad that this bug is getting press now so maybe it&#x27;ll get fixed. Without the public visibility, only the bad guys would have this ability.<p>And as another reminder, an exploit that can reboot a device might be able to leverage that memory leak, null dereference, or whatever else to do more than just crash it.
评论 #38132595 未加载
评论 #38134034 未加载
评论 #38141163 未加载
mo_42over 1 year ago
It&#x27;s one thing that iPhones are prone to this attack.<p>It&#x27;s another thing that Apple confuses people with disabling Bluetooth. I always need to go to settings -&gt; Bluetooth to really turn it off instead of using this pull-down menu. I assume many non-technical people don&#x27;t understand this difference. So it seems like a violation of UX principles that only makes users feel to be in control.
评论 #38127081 未加载
评论 #38127179 未加载
评论 #38126516 未加载
panki27over 1 year ago
I tried and crashed my iPhone with this. I locked the screen, and it never turned back on. Had to force a reboot for it to come back to live. So not &quot;never ending&quot; unless you stay within the Flippers BLE range, which is rather limited.<p>Also, the notifications trigger on Windows aswell.
greyface-over 1 year ago
The attack in question: <a href="https:&#x2F;&#x2F;github.com&#x2F;Flipper-XFW&#x2F;Xtreme-Firmware&#x2F;blob&#x2F;1a9c9cc32ff358f05a63b38348ba58fa225a3e9a&#x2F;applications&#x2F;external&#x2F;ble_spam&#x2F;protocols&#x2F;continuity.c#L257">https:&#x2F;&#x2F;github.com&#x2F;Flipper-XFW&#x2F;Xtreme-Firmware&#x2F;blob&#x2F;1a9c9cc3...</a>
swamp40over 1 year ago
I noticed last night our iPad can request Personal Hotspot access even when my iPhone Hotspot is off. There is 0 delay between pressing the hotspot button and my phone beeping. And you can do it as often as you like.<p>It certainly doesn&#x27;t go through the internet. I suspect it is direct ipad to iphone communication. I&#x27;m going to turn Bluetooth off tonight and see if it goes away.
评论 #38133869 未加载
steve1977over 1 year ago
… as long as the device can connect to the iPhone via Bluetooth.<p>That’s still not good of course, but the headlines makes it sound like the phone is getting bricked, which is not the case.
评论 #38126017 未加载
gnicholasover 1 year ago
This could be used as a way to get someone to type in their password (required on restart) in a visible environment where it can be captured by thieves. The thieves then steal&#x2F;rob the phone from the person, and can access the phone, including sensitive banking apps. This allows thieves to steal a phone but get something much more valuable — thousands of dollars in bank transfers.
评论 #38133941 未加载
cirrus3over 1 year ago
&gt; A similar attack can also be used on Android devices and Windows laptops. BleepingComputer reported last week that the Bluetooth spam attacks can be used on Samsung Galaxy phones to generate a never-ending amount of pop-ups.
qupover 1 year ago
&quot;Little tool&quot; = Flipper zero<p>&gt; [the attacker was] using a Flipper Zero device with custom firmware to send a combination of Bluetooth low energy (BLE) alerts to nearby iPhone handsets running iOS 17.<p>&gt; If you have an iPhone running iOS 17, then the only reliable way to protect against the pop-ups and crash attack is by disabling Bluetooth.
评论 #38132692 未加载
acheong08over 1 year ago
You don’t need a Flipper Zero, just a Bluetooth chip.
评论 #38132852 未加载
ameliusover 1 year ago
&gt; security researcher Jeroen van der Ham fell victim to the exploit on a train journey last month<p>Holy crap ... this means that it probably happened to many other people too.<p>Unless this was a train going to a security conference.
评论 #38132920 未加载
Shankover 1 year ago
Even if the device doesn’t crash, the inundation of these alerts is still a DoS and at times, very scary. You can generate them with various prompts, including some that prompt to transfer your phone number to a new device or setup a new iPhone. They’re disruptive and scary, and there needs to be a better protection system in-place against this.
评论 #38126378 未加载
bell-cotover 1 year ago
[sigh&#x2F;]<p>Apple&#x27;s aura: Perfect security &amp; privacy<p>Apple&#x27;s reality: Overall less-crappy security &amp; privacy than its leading competitors<p>For a premium brand seeking to maximize profit, this makes perfect business sense. And Tim Cook is pretty good at both the &quot;business&quot; and &quot;profit maximizing&quot; stuff.
评论 #38127061 未加载
AlotOfReadingover 1 year ago
Bluetooth stacks are a pretty rich source of bugs and security issues. Back when I was working at a consumer electronics manufacturer circa 2010, I documented nearly a dozen different crashes&#x2F;bugs on Android and iOS devices caused by malformed packets my own buggy code was sending. Even simple things like getting the length of HID descriptors wrong would crash iOS at the time. I imagine they&#x27;ve fixed a lot of those with time and better tooling, and BLE is a much simpler standard to boot, but clearly there&#x27;s still some gremlins lying around.
accrualover 1 year ago
What do we think the fix is on the iOS 17?<p>If it were me, knowing nothing about the inner details of iOS, I would apply some kind of rate limit or throttling on incoming BT connections and allow the user to ignore repeated incoming connections. It would be not unlike trying to download multiple files from the same website, which usually triggers a &quot;do you want to allow $site to download multiple files?&quot; prompt.<p>Maybe I&#x27;m naïve, but this seems trivial to prevent.
评论 #38134966 未加载
camila45over 1 year ago
I never anticipated to see Remotespywise reviews here, despite the fact that they once assisted me in hacking and spying on my husband&#x27;s and kids&#x27; cell phones and devices, giving me access to all of their new and deleted messages as well as those from all of their social media platforms. remotespywise @ gmil com is very straightforward and upfront in their works, so it&#x27;s wonderful that they receive all the recommendations like this, allowing many people who are searching for a very reputable and expert hacking business to learn about them . remotespywise @ gmil com is well-known for recovering digital assets from con artists and providing all kinds of hacking service
extraduder_ireover 1 year ago
Has anyone ported this to the ESP32?<p>I&#x27;d be a lot cheaper to get a bunch of those, versus one flipper zero.
评论 #38126409 未加载
bastard_opover 1 year ago
I feel it obligatory to bring my flipper and start crashing every iphone around me where ever I go. What can go wrong?
评论 #38133977 未加载
Freak_NLover 1 year ago
Good job by the hacker on the train. The more people get used to the idea that their smartphone won&#x27;t always work when they want it, the more they won&#x27;t exclusively rely on it when there is a more significant risk. It&#x27;s a one-man public service campaign.
评论 #38126366 未加载
评论 #38126377 未加载