{"id":3144,"date":"2011-07-11T10:39:43","date_gmt":"2011-07-11T09:39:43","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=3144"},"modified":"2015-09-09T19:37:10","modified_gmt":"2015-09-09T11:37:10","slug":"malicious-pdf-files-to-exploit-iphone-ipad-zero-day-in-the-wild","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2011\/07\/malicious-pdf-files-to-exploit-iphone-ipad-zero-day-in-the-wild\/","title":{"rendered":"Malicious PDF Files To Exploit iPhone & iPad Zero Day In The Wild"},"content":{"rendered":"

Well everyone has been waiting for a Jailbreak<\/a> for the iPad 2 with the latest version of iOS – it happened and only hours later the malformed PDF files that were used in the exploit were circulating the Internet.<\/p>\n

It’s not the first time this has happened, last time jailbreakme<\/a> did the same thing back in August 2010 – Dangerous iPhone iOS JailBreak Exploit Goes Public<\/a>.<\/p>\n

The exploit is quite a nasty one, and the irony is this time – only users that have applied the Jailbreak then the additional ‘PDF Patcher 2’ software (from Cydia) are safe from this. Users running the vanilla version of iOS are actually at risk.<\/p>\n

Hours after developers revealed they had exploited bugs in Apple’s iOS to “jailbreak” iPhones and iPads, German government security authorities warned that one of the flaws could be put to malicious use.<\/p>\n

Malformed files that exploit the vulnerability have been publicly posted on the Internet. Late Wednesday, Germany’s Federal Office for Information Security, known by its German-language initials of BSI for “Bundesamt fuer Sicherheit in der Informationstechnik,” warned citizens that the iOS bug could be used by criminals to hijack iPhones, iPads and iPod Touches.<\/p>\n

“Even clicking a crafted PDF document or surfing to a website with the PDF documents are sufficient to infect the mobile device with malicious software,” the BSI said in a translation of the German-language alert .<\/p>\n

PDF files that successfully exploit the vulnerability are available on the Web, according to Mikko Hypponen, chief research officer of Helsinki-based antivirus company F-Secure. And those PDFs could be used by miscreants to hack iOS devices simply by luring users to malicious sites, said Andrew Storms, director of security operations at nCircle Security.<\/p>\n

iPhone and iPad users steered to a malicious PDF — via a link embedded in an email, for instance — would not receive any warning or be required to take additional action. <\/p><\/blockquote>\n

I hope Apple<\/a> gets their act together and pushes out the patch for this ASAP as I foresee some kind of iPhone\/iPad targeted worm coming out of this fairly shortly.<\/p>\n

It took them 10 days to patch a similar pair of exploits back in August 2010 so we should be expecting a patch by the end of this week (mid-July sometime).<\/p>\n

The worrying part when it comes to business\/agencies\/government etc – is that these exploits could be used to target specific individuals of importance. All you need to know is the e-mail address they access on their iPhone\/iPad and do a bit of social engineering<\/a> and you’re in.<\/p>\n