Close Menu
Alpha Leaders
  • Home
  • News
  • Leadership
  • Entrepreneurs
  • Business
  • Living
  • Innovation
  • More
    • Money & Finance
    • Web Stories
    • Global
    • Press Release
What's On
‘Reboot Your PC’—Microsoft Changes ‘Most Windows Devices’ In June

‘Reboot Your PC’—Microsoft Changes ‘Most Windows Devices’ In June

18 May 2026
Pope Leo launches an AI commission ahead of papal letter release with Anthropic cofounder

Pope Leo launches an AI commission ahead of papal letter release with Anthropic cofounder

18 May 2026
‘Back Up Your Messages’—Samsung Shuts Down Texting After 17 Years

‘Back Up Your Messages’—Samsung Shuts Down Texting After 17 Years

18 May 2026
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
Alpha Leaders
newsletter
  • Home
  • News
  • Leadership
  • Entrepreneurs
  • Business
  • Living
  • Innovation
  • More
    • Money & Finance
    • Web Stories
    • Global
    • Press Release
Alpha Leaders
Home » Apple iPhone USB-C Hacked—What Users Need To Know
Innovation

Apple iPhone USB-C Hacked—What Users Need To Know

Press RoomBy Press Room14 January 20259 Mins Read
Facebook Twitter Copy Link Pinterest LinkedIn Tumblr Email WhatsApp
Apple iPhone USB-C Hacked—What Users Need To Know

Update, Jan. 14, 2025: This story, originally published Jan. 12, now includes further information regarding the impact of the Thomas Roth iPhone USB-C hack from other security experts, including the inventor of the O.MG Cable USB hacking tool, which is also explored as part of a juice-jacking threat model analysis.

With 100 million macOS users already reeling from news of a new credential-stealing attack, Safari users warned do not click twice, and even a report about iOS being targeted more by hackers than Android, it’s not been the most reassuring few weeks for Apple users. Now security researchers have disclosed details of a successful bypass of Apple security protections to hack the iPhone USB-C controller. So, what does this mean for smartphone security?

Hacking The iPhone USB-C Controller

The video of a talk bya security researcher, presented at the 38th Chaos Communication Congress, also known as 38C3, at the end of 2024 in Hamburg, Germany, has just been made available. The four-day conference that covers “technology, society and utopia” is organized by the legendary Chaos Computer Club and can usually be guaranteed to result in something shocking for the security community. 38C3 was no exception, and, at least as far as I’m concerned, that shocker was the hacking of Apple’s highly customized ACE3 USB-C controller that first appeared in the iPhone 15 series. Thomas Roth, also known by the hacker handle of stacksmashing, describes themselves as a security researcher who “creates videos on reverse-engineering, hardware security, and everything else I find interesting.” And thank goodness they do. If you are of a technical mindset then please go and check out the full 38C3 presentation video. There you will learn how, after attempting different software avenues of attacking the USB-C controller, including building a small “fuzzer” and finding a timing side-channel attack to enumerate available commands, all with no success, Roth determined it was time to turn to hardware attacks because ACE3 implemented firmware personalization.

For everyone else, here’s the TL;DR.

The ACE3 custom USB-C controller was introduced with the iPhone 15 and iPhone 15 Pro series, which brought the change to USB-C for Apple’s smartphone users. Roth explained how, as well as managing USB power delivery for the iPhone, the device is a “full microcontroller running a full USB stack connected to some of the internal busses of the device.” The researcher was able to exploit a multitude of different things, including reverse engineering, side-channel analysis and electromagnetic fault-injection in order to achieve code execution on the ACE3. What does that all mean? Roth could dump the ROM and analyze functionality as a result.

I have approached Apple for a statement.

Stacksmashing Explains The iPhone USB-C Hack Vulnerability Risk

I spoke to Roth to find out more. First the good news: when it comes to the broader smartphone ecosystem, Android users take note, Roth told me that the research “does not have much impact beyond the iPhone/MacBook,” so you can relax. But what about iOS users? I asked Roth about the potential impacts that his USB-C hack could have on iPhone security. “When we look at the security of modern smartphones,” Roth explained, “there are many aspects that can be insecure: software running on the main processor, but also software running in the baseband (which handles the mobile connectivity), the secure element, or chips such as the ACE3.” Roth went on to say that the most significant difficulty is how anyone can begin to research a chip in a device for which there is no available documentation or firmware. “By showing how one can get code-execution (and dump the firmware) of the ACE3, it essentially lays the groundwork for further research,” Roth said, “and by having the firmware, one can now start looking for software vulnerabilities that might be there.” Things could, therefore, start to get interesting from this point on if any new security vulnerabilities are uncovered. Really interesting, to be honest, depending on who finds them: not everyone exploring such hackery has good intentions like Roth, after all.

Talking of which, I asked about the contact that Roth had with Apple regarding his research findings. Roth told me that he had reported both his earlier ACE2 attack and the ACE3 attack to Apple. “For the ACE2 (software) attack they at first confirmed that they’d fix it in fall 2024, but then notified me that they won’t fix it as it’s a hardware issue,” Roth said. When it came to the ACE3 attack, however, Roth said that while Apple “saw the attack complexity and said that they don’t see it as a threat – I agree with that sentiment but wanted to at least have reported it!” The reasoning being, Roth told me, that as already explained “this is essentially foundational research, the first steps that are needed to find other attacks on the chip.”

Interestingly, Roth also said that he has been contacted by a number of third-party Apple repair specialists who have said that they have already found the research “helpful to diagnose and repair broken Macs.”

Security Experts Speak Out About The iPhone USB-C Hack

Rich Newton, managing consultant at Pentest People, said that the “Apple iPhone USB-C hack revelation highlights the importance of robust safeguards against juice jacking, which exploits public charging ports to compromise devices,” and recommended users employ technical controls such as “USB data blockers or charge-only cables ensure power transfer without data exchange.”

Meanwhile, Adam Pilton, a senior cybersecurity consultant at Cybersmart, said that while it is, of course, important to be clear that currently there is no immediate risk to Apple users, “the fact that cybercriminals could potentially dump the ROM and analyze its functionality is a concern.” Also of concern to Pilton, however, is Apple’s response: “Essentially, they’re aware, but it’s a hardware issue, so they’re not going to do anything,” he said. Yet having access to read-only memory, for a cybercriminal, is “like holding the blueprint for a bank,” Pilton warned, “Cyber criminals will meticulously review this information to find a weakness or a back door that will allow them to gain access and commit their criminality.” Acting now, instead of later, could save iPhone users a lot of potential pain further down the line, Pilton said, concluding, “Time will tell if vulnerabilities are discovered, but I’m confident to say that nation states will show particular interest in this news and will find a way to use this information against the interests of Apple and their customers.”

I also spoke to Mike Grover, best known as MG, the inventor of the O.MG Cable computer in a USB cable hacking tool, who said that he thought the research was very cool. “I’m looking forward to the research that will come from the dumped firmware,” Grover said, adding that he thought “the risk assessment is correct.” While reasonably sure that Apple will “eventually make a hardware revision,” Grover warned that “the perceived complexity of the attack is something that can be significantly reduced with a bit of effort,” which should be heeded by those thinking this is something of a nothing-burger.

The iPhone Juice-Jacking USB Threat

The number of warnings regarding the so-called juice-jacking threat to smartphone and laptop users is so multitudinous that I’m not going to link to any here. Seriously, go type “juice jacking” into Google and take your pick. The sources are as varied as the results, of course, with everyone from security vendors with a solution to sell through to federal law enforcement and intelligence agencies, with more than the odd few conspiracy theorists in between. Most truly independent security professionals, however, will tell you that for most people, most of the time, the risk of falling victim to a juice-jacking attack is so low as to be almost risible. So, what is this threat model and why is it something that you will likely never experience out in the real world?

I rather like the Wikipedia entry for juice-jacking which describes it as being a “theoretical type of compromise of devices like smartphones and tablets,” specifically those using the same cable for both charging the device and transferring data. Also known, dear friends, as a USB cable. That same entry points out that, as of April 2023 when it was published, “there have been no credible reported cases of juice jacking outside of research efforts.” I am not aware that this has changed in the 20 months that have followed, but I am happy to be proved wrong. These theoretical attacks either aim to install malware onto the connected device or copy data directly.

This isn’t to say that such attacks do not happen, but if they do, then they are likely to go unnoticed and indeed not be reported as they will have been very highly targeted and carried out by the kind of intelligence agencies that know how to fly under the radar. And that’s the point: just because a data exfiltration methodology is possible doesn’t mean it’s probable you will be a victim. In the case of juice-jacking the target would fall into the highly-valuable category of a politician, leading business person, possibly a journalist or activist. All of the people who are already, or should be, on high alert about the potential for eavesdropping attacks and taking measures to mitigate them. Measures such as, oh, I don’t know, using their own USB cables and chargers in public places.

So, where does the O.MG cable come into this? The cable, as already mentioned, invented by Mike Grover, is essentially a computer in a USB connector that is capable of a myriad of hacking tricks in the right hands. Designed to “allow your Red Team to emulate attack scenarios of sophisticated adversaries,” the cables are renowned for being a groundbreaking hardware addition to the offensive hacking arsenal and for their use in defense team detection models. “They are also extremely impactful tools for teaching and training,” Grover said.

What Action Do iPhone Users Need To Take?

The simple answer is none. There are no new iPhone threats to have emerged, as of yet, from this groundbreaking USB-C controller hacking research, so no new mitigations to be employed. However, as far as the broader threat from rogue USB attack methodologies such as the aforementioned juice-jacking, the mitigation advice is straightforward enough: if you are in the least bit concerned about this threat model, then make sure you use your own charging kit wherever you go. Portable chargers are small enough, and with the advent of MagSafe user-friendly enough, so that there’s really no excuse to be plugging into an unknown charging hub at the airport, train station or hotel lobby.

ACE3 ACE3 USB-C controller hacked Apple iPhone Apple iPhone Hack iPhone hack iPhone Hacked iPhone USB-C iPhone USB-C Security smartphone security USB-C hacked
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link

Related Articles

‘Reboot Your PC’—Microsoft Changes ‘Most Windows Devices’ In June

‘Reboot Your PC’—Microsoft Changes ‘Most Windows Devices’ In June

18 May 2026
‘Back Up Your Messages’—Samsung Shuts Down Texting After 17 Years

‘Back Up Your Messages’—Samsung Shuts Down Texting After 17 Years

18 May 2026
‘Never Google’—Save These Numbers Before You Fly Again

‘Never Google’—Save These Numbers Before You Fly Again

18 May 2026
5 Benefits And Risks Of Using AI For Cybersecurity

5 Benefits And Risks Of Using AI For Cybersecurity

18 May 2026
Apple Sends Out WWDC 2026 Invites With A “Coming Bright Up” Tease

Apple Sends Out WWDC 2026 Invites With A “Coming Bright Up” Tease

18 May 2026
EA UFC 6 Devs Explain Real-Time Contact And Flow State

EA UFC 6 Devs Explain Real-Time Contact And Flow State

18 May 2026
Don't Miss
Unwrap Christmas Sustainably: How To Handle Gifts You Don’t Want

Unwrap Christmas Sustainably: How To Handle Gifts You Don’t Want

By Press Room27 December 2024

Every year, millions of people unwrap Christmas gifts that they do not love, need, or…

Exclusive: DeFi platform Azura launches after raising .9 million from Initialized

Exclusive: DeFi platform Azura launches after raising $6.9 million from Initialized

22 October 2024
Walmart dominated, while Target spiraled: the winners and losers of retail in 2024

Walmart dominated, while Target spiraled: the winners and losers of retail in 2024

30 December 2024
Stay In Touch
  • Facebook
  • Twitter
  • Pinterest
  • Instagram
  • YouTube
  • Vimeo
Latest Articles
‘Never Google’—Save These Numbers Before You Fly Again

‘Never Google’—Save These Numbers Before You Fly Again

18 May 20261 Views
6.7 million people thought they were ripping apart an AI-generated Monet painting. But it was real

6.7 million people thought they were ripping apart an AI-generated Monet painting. But it was real

18 May 20261 Views
5 Benefits And Risks Of Using AI For Cybersecurity

5 Benefits And Risks Of Using AI For Cybersecurity

18 May 20262 Views
While Trump insisted the Iran war would end ‘soon,’ an account in his name was ‘Selling America’

While Trump insisted the Iran war would end ‘soon,’ an account in his name was ‘Selling America’

18 May 20261 Views

Recent Posts

  • ‘Reboot Your PC’—Microsoft Changes ‘Most Windows Devices’ In June
  • Pope Leo launches an AI commission ahead of papal letter release with Anthropic cofounder
  • ‘Back Up Your Messages’—Samsung Shuts Down Texting After 17 Years
  • NextEra’s $67 billion Dominion takeover creates world’s largest utility to win the AI power surge
  • ‘Never Google’—Save These Numbers Before You Fly Again

Recent Comments

No comments to show.
About Us
About Us

Alpha Leaders is your one-stop website for the latest Entrepreneurs and Leaders news and updates, follow us now to get the news that matters to you.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks
‘Reboot Your PC’—Microsoft Changes ‘Most Windows Devices’ In June

‘Reboot Your PC’—Microsoft Changes ‘Most Windows Devices’ In June

18 May 2026
Pope Leo launches an AI commission ahead of papal letter release with Anthropic cofounder

Pope Leo launches an AI commission ahead of papal letter release with Anthropic cofounder

18 May 2026
‘Back Up Your Messages’—Samsung Shuts Down Texting After 17 Years

‘Back Up Your Messages’—Samsung Shuts Down Texting After 17 Years

18 May 2026
Most Popular
NextEra’s  billion Dominion takeover creates world’s largest utility to win the AI power surge

NextEra’s $67 billion Dominion takeover creates world’s largest utility to win the AI power surge

18 May 20260 Views
‘Never Google’—Save These Numbers Before You Fly Again

‘Never Google’—Save These Numbers Before You Fly Again

18 May 20261 Views
6.7 million people thought they were ripping apart an AI-generated Monet painting. But it was real

6.7 million people thought they were ripping apart an AI-generated Monet painting. But it was real

18 May 20261 Views

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • March 2022
  • January 2021
  • March 2020
  • January 2020

Categories

  • Blog
  • Business
  • Entrepreneurs
  • Global
  • Innovation
  • Leadership
  • Living
  • Money & Finance
  • News
  • Press Release
© 2026 Alpha Leaders. All Rights Reserved.
  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Type above and press Enter to search. Press Esc to cancel.