Your iPhone can be hacked with malware even when it’s switched off, new research finds


According to a new investigation, malware can be loaded into an iPhone even while it is switched off.

Researchers at the Technical University of Darmstadt in Germany discovered that a Bluetooth chip may be abused and hacked to install malware on a device without the user’s knowledge, even while the phone is turned off.

This is in light of the latest iOS 15 release, which features a function that allows you to find an iPhone even if it is turned off.

Apple claims that this new function would improve user security by allowing them to locate a lost or stolen phone even while it is switched off.

Researchers warn that because the chips remain active even when the iPhone is shut off, this could represent a new threat.

According to the report, the capability is available because three wireless chips remain active – Bluetooth, Near Field Communication (NFC), and Ultra-wideband (UWB).

This permits the phone to keep sending signals and is intended to assist the owner in locating their phone if it is lost.

This is referred to as “Low-Power Mode” in the article, and it’s “distinct from the energy-saving mode indicated by a yellow battery symbol.”

Malware can infect your iPhone even when it is turned off.

The research, titled “Evil Never Sleeps: When Wireless Malware Stays On After Turning Off iPhones,” was published last week and claimed that malware could be installed on the iPhone’s Bluetooth chip.

There is currently no proof that this type of attack has been carried out.

The study also suggests that in order to access and exploit the Bluetooth chip, hackers would have to first hack and jailbreak the iPhone.

There is currently no proof that this type of attack has been carried out.
is hypothetical, with no evidence that such an attack has been deployed.

Despite this, the findings have generated serious privacy and data security issues.

“Wireless chips in current iPhones can no longer be trusted to switch off after shutdown.
This creates a whole new threat model “The newspaper forewarned.

“Previous research merely assumed that setting aeroplane mode in case their devices were compromised would protect journalists from surveillance.

“[Low-Power Mode] is a relevant attack surface that high-value targets, such as journalists, should be aware of, or that can be weaponized to create wireless malware that operates on shutdown iPhones.”

According to the document, researchers informed Apply of the discovered security flaws, but the firm received no response.

“In the early iOS 15 betas, Apple included the ‘Find My After Power Off’ feature.
We assumed that this capability was built into the Bluetooth firmware, which worried us because our team had previously discovered many security flaws in that firmware “Jiska Classen, one of the study’s lead researchers, told Euronews Next.

“After a thorough investigation, we discovered that three wireless chips: Bluetooth, NFC, and UWB have the ability to stay on after the power has been turned off.
Bluetooth firmware is the most vulnerable and may be altered “.

If malicious software, such as Pegasus, is installed on a smartphone, “[it] could not install malware running in the Bluetooth chip when the iPhone is switched off,” according to Classen.

Is it necessary to be concerned?

“We assume that the normal person is not a target for such spyware,” she continued.

She does, however, mention that politicians or journalists, as well as their close associates, may be vulnerable to these attacks, citing Citizen Lab research that found dozens of Al Jazeera journalists were hacked using spyware.

“Since the iPhone 11, Apple has made hardware adjustments to support Bluetooth after power off, and these hardware changes cannot be reversed,” Classen stated.

“In future iPhones, Apple may have a physical power switch that disconnects the battery.”

“Broadcom, the Bluetooth chip maker, indicated they have functionality for checking firmware signatures, and Apple might enable this feature in future iPhone Bluetooth ROMs.”

Classen was quick to point out to Euronews Next that they were merely demonstrating the possibility of malware being planted in Bluetooth chips, not that this is typical practise.

“It’s impossible to say whether malware attacks are on the rise because many attacks go undetected,” she noted.

“As far as we know, this has never been employed against real-world targets.”

When contacted by Euronews Next, Apple declined to comment.

0 0 votes
Article Rating
Notify of

Inline Feedbacks
View all comments

Latest news


Table of Contents1. Make use of keyboard shortcuts2. A universe of widgets and integrations3. Use technology to defeat technology4....

10 Best Backpacking and Camping gadgets 2024

Table of Contents10 Best Backpacking and Camping gadgets1. Living Lodge at Snow Peak M2. Camper JISULIFE Fan3. NOMAD Smoker...

20 Cool Smart home Gadgets on Amazon 2024, trend this year!

Table of Contents20 Cool Smart home Gadgets on Amazon1. Twelve South AirFly Pro Bluetooth Wireless Audio Transmitter/Receiver:2. PhoneSoap Dual...

Top 10 gadgets to buy under Rs.1000

Table of ContentsTop 10 gadgets to buy under Rs.1000 on Amazon India1. pTron Bullet Pro 36W PD Quick Charge2....

Latest Updates

Must read

Logitech Launches MX Mechanical, MX Mechanical Mini Keyboards and MX Master 3S Mouse: Details

MX Mechanical is now available for $169.99 on Logitech's...

Backbone One PlayStation Edition Controller For IPhone Launched, Sony Adds 1440p Support To PS5

Table of ContentsBackbone One PlayStation Edition controller for iPhone...

You might also likeRELATED
Recommended to you

Would love your thoughts, please comment.x