Have you used a friend's laptop to charge your iPhone and gotten a prompt that says, "Trust This Computer?" Say yes, and the computer will be able to access your phone settings and data while they're connected.
And while it doesn't feel like your answer really matters—your phone will charge either way—researchers from Symantec warn that this seemingly minor decision has much higher stakes than you'd think.
In fact, the Symantec team has found that hacks exploiting that misplaced "Trust" comprise a whole class of iOS attacks they call "trustjacking." Once a user authorizes a device, they open themselves to serious and persistent attacks while their phone is connected to the same Wi-Fi network as a hacker, or even remote attacks when the devices are separated. Adi Sharabani, Symantec's senior vice president of modern operating system security, and Roy Iarchy, the modern operating system research team leader, will make that case Wednesday, in a presentation at the RSA security conference in San Francisco.
"Once this trust is established, everything is possible," Sharabani told last week. "It introduces a new vector of attack." Sharabani and Iarchy's presentation focuses largely on a feature known as iTunes Wi-Fi Sync, the tool that lets iOS devices sync with desktop iTunes over Wi-Fi. For this process you physically connect a mobile device to a computer once, indicate that the iOS device can trust the computer going forward, and then enable iTunes Wi-Fi Sync from the PC. After that the two devices can sync and communicate whenever they are on the same Wi-Fi network without any further approval from the iPhone or iPad.
It's a reasonable and useful feature when used as intended. But an attacker could also plant a malicious computer—perhaps one shaped like a charging station or external battery—and trick people into connecting their devices and granting trust out of confusion or disinterest.
Once a trusted Wi-Fi Sync connection is established, attackers can not only do basic syncing, but also take advantage of controls meant for developers to manipulate the victim iOS device. A hacker could work quickly to install malware on the phone, or initiate a backup to gather data like a victim's photos, app information, and SMS/iMessage chats. Attackers with trust privileges could also start watching a target device's screen in real-time by initiating screenshots on the phone and then syncing them to the attack computer. Or they could play a long game, silently retaining their trusted status until it is long forgotten, for a future attack.
"We discovered this by mistake actually," Sharabani says. "Roy was doing research and he connected his own iPhone to his own computer to access it. But accidentally he realized that he was not actually connected to his own phone. He was connected to one of his team members’ phones who had connected their mobile device to Roy’s desktop a few weeks before. So Roy started to dig into what exactly he could do and find out if he were an attacker."
You can imagine a number of scenarios where this could work as a targeted attack. Everyone has places they visit regularly: an office, a coffee shop, the local library. Attackers could anticipate that a victim iOS device would regularly connect to the same Wi-Fi network as the trusted attacker computer—enabling clandestine, malicious backups with iTunes Wi-Fi Sync. The researchers point out that an attacker wouldn't necessarily be geographically limited; after gaining a foothold, they could combine trustjacking with a type of attack called "malicious profiles," which takes advantage of how iOS manages configuration packages for apps to get around access restrictions, establish continuous remote access. Beginning in iOS 10, though, Apple started making it harder for hackers to carry out malicious profile attacks.
It's tempting to put the onus on the iPhone owner here; you shouldn't, after all, connect with sketchy computers an trust them in the first place. And Apple, which declined to comment for this story, seems to agree. When Sharabani and Iarchy disclosed their findings to the company, it did add a second prompt in iOS 11 to require a device's passcode as part of authorizing a new computer as trusted. This makes it more difficult for anyone other than the device owner to establish trust.
But Sharabani and Iarchy argue that it's unreasonable to put it entirely on the user to make the correct choice about trusting a device, especially since the authorization persists indefinitely once it's established. There's also currently no way to see a list of devices that have outstanding trusted status.
In these transactions, iOS's wording is also unhelpful. The prompts say, "Trust this computer? Your settings and data will be accessible from this computer when connected," which might seem to mean that nothing will be exposed when the devices are no longer physically connected. In fact, given that Wi-Fi sync can be enabled in desktop iTunes without any involvement of the mobile device, there's much more potential for long-term connection than users may realize.
Consider, too, that an attacker who successfully infects a target's PC with malware can exploit the trust a victim grants his own computer. A user will obviously trust their own computer, and their phone and PC will frequently be on the same Wi-Fi network. So an attacker who has infected a target's computer can get a two-for-one of also having regular access to the victim's iOS devices.
"Apple took the very quick act of adding the passcode," Sharabani notes. "With that said, this is a design problem. They could better design the future behavior of the features, but it will take them time to implement. That's why it’s so important to alert users and raise awareness. Users need to understand the implications."
Sharabani and Iarchy say they haven't seen trustjacking attacks in the wild so far, but that doesn't mean they aren't out there or coming. And though Apple doesn't offer a list of the computers an iOS device trusts, it is possible to scrub the trusted computers list entirely. In iOS 11 users can go to Settings > General > Reset > Reset Location & Privacy to get a clean slate, after which people can start to be more cognizant of which computers they authorize. (Note that doing this reset also revokes all specially granted app permissions.) Another helpful defense for users is to encrypt iOS device backups with a strong password. With this turned on, an attacker abusing Wi-Fi Sync can still make their own backups of a victim device, but they will be encrypted with whatever password the target chose.
The researchers see iOS's authorization prompts as a single point of failure, where the operating system could provide a few more prompts in exchange for more layers of defense against trustjacking. No one wants one seemingly insignificant mistake to blow up in their face weeks or months later. But while users wait for Apple to architect long-term solutions, their best defense is to become discerning and extremely selective about doling out trust.
110 Reykjavik, Iceland