Jailbreaking puts iPhone owners at risk, says researcher

Modified iPhones lack security defenses, says Charlie Miller
  • (Computerworld (US))
  • — 10 November, 2009 05:25

Jailbroken iPhones are much easier to hijack, a noted security researcher said today, and the proof is in the worm that has infected some Australian phones.

The worm, known as "ikee," has been billed as the first iPhone worm, a title that Charlie Miller, famous for hacking iPhones and Macs, said is accurate. "I'd say it was a worm," said Miller. "It spreads, and it executes remote code, so it's a worm." Miller also agreed that it was the first, saying that although he and others have crafted exploits that compromise the iPhone, they have never been wrapped into a worm.

Miller, formerly with the National Security Agency and now an analyst with Baltimore-based Independent Security Evaluators (ISE), was one of three researchers who uncovered the first iPhone vulnerability in July 2007, just weeks after Apple debuted the smartphone. He's also known for successfully hacking Macs two years running at the annual "Pwn2own" contest, and is the co-author of The Mac Hacker's Handbook .

The ikee worm was released last Wednesday by Ashley Towns, a 21-year-old unemployed programmer from Wollongong, Australia, who told the IDG News Service that he intended it as a prank, and as a lesson to users who jailbroke their iPhones.

Miller, however, said that the lesson is more than the one Towns maintained: that users should change the default password of the SSH (secure shell) Unix utility. Towns' worm accessed others' iPhones using that default password, then changed their devices' wallpaper. SSH lets users connect to their iPhone remotely over the Internet over a encrypted channel.

"A year ago, I didn't think that jailbroken iPhones were less secure than those that weren't jailbroken," said Miller. "But I've changed my mind."

By jailbreaking an iPhone -- the term describes the process of modifying a device so its owner can download and install unauthorized software -- people leave themselves open to attacks that an unaltered iPhone would easily deflect, said Miller.

"The obvious reason why they're less secure is that you get extra software on the iPhone when you jailbreak," noted Miller, referring to the tools necessary to both hack the smartphone and install applications not approved by Apple. "But there are other, less-obvious reasons, too."

Among the latter is the fact that by design, a jailbroken iPhone allows software to run as "root," the Unix-based user account allowed to access the entire operating system. That gives hackers automatic access to everything on the iPhone, something not possible on a standard iPhone without an existing vulnerability and a working exploit.

"Jailbroken iPhones don't obey the security model of the iPhone," Miller said. "The whole point [of jailbreaking] is to break the security model."

Jailbreaking sidesteps other Apple-created security defenses for the iPhone, including the "sandbox" that applications are restricted to when they run. "Sandboxing prevents apps from doing things like accessing other apps," noted Miller.

And jailbreaking an iPhone also gives hackers a much easier entry into the iPhone's operating system, which is a bare bones version of the Mac OS X operating system Apple uses for its laptop and desktop computers. "The iPhone's OS is really stripped," said Miller. "There's no shell, for example. So for an attacker, normal shell code doesn't run on an iPhone that's not been jailbroken."

In fact, some of the earliest exploits written for the iPhone assumed that the phone had been jailbroken.

"Apple made it really hard to break into the iPhone," Miller said, citing a layered defense that includes DEP (data execution prevention). "But jailbreaking breaks all those, including DEP," he added.

The ikee worm may be the first on the iPhone, but Miller's betting that it won't be the last. "There's not a lot of mobile expertise out there yet," said Miller. "But as that changes, we'll see more and more exploits, and worms are built on exploits."

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Gregg Keizer

Computerworld (US)
Topics: Ikee, security, iPhone, jailbreaking
Comments are now closed.

Latest News Articles

Most Popular Articles

Follow Us

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Resources

Best Deals on GoodGearGuide

Compare & Save

Deals powered by WhistleOut
WhistleOut

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?