Update, Jan. 14, 2025: This story, originally published Jan. 12, now includes further information regarding the impact of the Thomas Roth iPhone USB-C hack from other security experts, including the inventor of the O.MG Cable USB hacking tool, which is also explored as part of a juice-jacking threat model analysis.

With 100 million macOS users already reeling from news of a new credential-stealing attack, Safari users warned do not click twice, and even a report about iOS being targeted more by hackers than Android, it’s not been the most reassuring few weeks for Apple users. Now security researchers have disclosed details of a successful bypass of Apple security protections to hack the iPhone USB-C controller. So, what does this mean for smartphone security?

Hacking The iPhone USB-C Controller

The video of a talk bya security researcher, presented at the 38th Chaos Communication Congress, also known as 38C3, at the end of 2024 in Hamburg, Germany, has just been made available. The four-day conference that covers “technology, society and utopia” is organized by the legendary Chaos Computer Club and can usually be guaranteed to result in something shocking for the security community. 38C3 was no exception, and, at least as far as I’m concerned, that shocker was the hacking of Apple’s highly customized ACE3 USB-C controller that first appeared in the iPhone 15 series. Thomas Roth, also known by the hacker handle of stacksmashing, describes themselves as a security researcher who “creates videos on reverse-engineering, hardware security, and everything else I find interesting.” And thank goodness they do. If you are of a technical mindset then please go and check out the full 38C3 presentation video. There you will learn how, after attempting different software avenues of attacking the USB-C controller, including building a small “fuzzer” and finding a timing side-channel attack to enumerate available commands, all with no success, Roth determined it was time to turn to hardware attacks because ACE3 implemented firmware personalization.

For everyone else, here’s the TL;DR.

The ACE3 custom USB-C controller was introduced with the iPhone 15 and iPhone 15 Pro series, which brought the change to USB-C for Apple’s smartphone users. Roth explained how, as well as managing USB power delivery for the iPhone, the device is a “full microcontroller running a full USB stack connected to some of the internal busses of the device.” The researcher was able to exploit a multitude of different things, including reverse engineering, side-channel analysis and electromagnetic fault-injection in order to achieve code execution on the ACE3. What does that all mean? Roth could dump the ROM and analyze functionality as a result.

I have approached Apple for a statement.

Stacksmashing Explains The iPhone USB-C Hack Vulnerability Risk

I spoke to Roth to find out more. First the good news: when it comes to the broader smartphone ecosystem, Android users take note, Roth told me that the research “does not have much impact beyond the iPhone/MacBook,” so you can relax. But what about iOS users? I asked Roth about the potential impacts that his USB-C hack could have on iPhone security. “When we look at the security of modern smartphones,” Roth explained, “there are many aspects that can be insecure: software running on the main processor, but also software running in the baseband (which handles the mobile connectivity), the secure element, or chips such as the ACE3.” Roth went on to say that the most significant difficulty is how anyone can begin to research a chip in a device for which there is no available documentation or firmware. “By showing how one can get code-execution (and dump the firmware) of the ACE3, it essentially lays the groundwork for further research,” Roth said, “and by having the firmware, one can now start looking for software vulnerabilities that might be there.” Things could, therefore, start to get interesting from this point on if any new security vulnerabilities are uncovered. Really interesting, to be honest, depending on who finds them: not everyone exploring such hackery has good intentions like Roth, after all.

Talking of which, I asked about the contact that Roth had with Apple regarding his research findings. Roth told me that he had reported both his earlier ACE2 attack and the ACE3 attack to Apple. “For the ACE2 (software) attack they at first confirmed that they’d fix it in fall 2024, but then notified me that they won’t fix it as it’s a hardware issue,” Roth said. When it came to the ACE3 attack, however, Roth said that while Apple “saw the attack complexity and said that they don’t see it as a threat – I agree with that sentiment but wanted to at least have reported it!” The reasoning being, Roth told me, that as already explained “this is essentially foundational research, the first steps that are needed to find other attacks on the chip.”

Interestingly, Roth also said that he has been contacted by a number of third-party Apple repair specialists who have said that they have already found the research “helpful to diagnose and repair broken Macs.”

Security Experts Speak Out About The iPhone USB-C Hack

Rich Newton, managing consultant at Pentest People, said that the “Apple iPhone USB-C hack revelation highlights the importance of robust safeguards against juice jacking, which exploits public charging ports to compromise devices,” and recommended users employ technical controls such as “USB data blockers or charge-only cables ensure power transfer without data exchange.”

Meanwhile, Adam Pilton, a senior cybersecurity consultant at Cybersmart, said that while it is, of course, important to be clear that currently there is no immediate risk to Apple users, “the fact that cybercriminals could potentially dump the ROM and analyze its functionality is a concern.” Also of concern to Pilton, however, is Apple’s response: “Essentially, they’re aware, but it’s a hardware issue, so they’re not going to do anything,” he said. Yet having access to read-only memory, for a cybercriminal, is “like holding the blueprint for a bank,” Pilton warned, “Cyber criminals will meticulously review this information to find a weakness or a back door that will allow them to gain access and commit their criminality.” Acting now, instead of later, could save iPhone users a lot of potential pain further down the line, Pilton said, concluding, “Time will tell if vulnerabilities are discovered, but I’m confident to say that nation states will show particular interest in this news and will find a way to use this information against the interests of Apple and their customers.”

I also spoke to Mike Grover, best known as MG, the inventor of the O.MG Cable computer in a USB cable hacking tool, who said that he thought the research was very cool. “I’m looking forward to the research that will come from the dumped firmware,” Grover said, adding that he thought “the risk assessment is correct.” While reasonably sure that Apple will “eventually make a hardware revision,” Grover warned that “the perceived complexity of the attack is something that can be significantly reduced with a bit of effort,” which should be heeded by those thinking this is something of a nothing-burger.

The iPhone Juice-Jacking USB Threat

The number of warnings regarding the so-called juice-jacking threat to smartphone and laptop users is so multitudinous that I’m not going to link to any here. Seriously, go type “juice jacking” into Google and take your pick. The sources are as varied as the results, of course, with everyone from security vendors with a solution to sell through to federal law enforcement and intelligence agencies, with more than the odd few conspiracy theorists in between. Most truly independent security professionals, however, will tell you that for most people, most of the time, the risk of falling victim to a juice-jacking attack is so low as to be almost risible. So, what is this threat model and why is it something that you will likely never experience out in the real world?

I rather like the Wikipedia entry for juice-jacking which describes it as being a “theoretical type of compromise of devices like smartphones and tablets,” specifically those using the same cable for both charging the device and transferring data. Also known, dear friends, as a USB cable. That same entry points out that, as of April 2023 when it was published, “there have been no credible reported cases of juice jacking outside of research efforts.” I am not aware that this has changed in the 20 months that have followed, but I am happy to be proved wrong. These theoretical attacks either aim to install malware onto the connected device or copy data directly.

This isn’t to say that such attacks do not happen, but if they do, then they are likely to go unnoticed and indeed not be reported as they will have been very highly targeted and carried out by the kind of intelligence agencies that know how to fly under the radar. And that’s the point: just because a data exfiltration methodology is possible doesn’t mean it’s probable you will be a victim. In the case of juice-jacking the target would fall into the highly-valuable category of a politician, leading business person, possibly a journalist or activist. All of the people who are already, or should be, on high alert about the potential for eavesdropping attacks and taking measures to mitigate them. Measures such as, oh, I don’t know, using their own USB cables and chargers in public places.

So, where does the O.MG cable come into this? The cable, as already mentioned, invented by Mike Grover, is essentially a computer in a USB connector that is capable of a myriad of hacking tricks in the right hands. Designed to “allow your Red Team to emulate attack scenarios of sophisticated adversaries,” the cables are renowned for being a groundbreaking hardware addition to the offensive hacking arsenal and for their use in defense team detection models. “They are also extremely impactful tools for teaching and training,” Grover said.

What Action Do iPhone Users Need To Take?

The simple answer is none. There are no new iPhone threats to have emerged, as of yet, from this groundbreaking USB-C controller hacking research, so no new mitigations to be employed. However, as far as the broader threat from rogue USB attack methodologies such as the aforementioned juice-jacking, the mitigation advice is straightforward enough: if you are in the least bit concerned about this threat model, then make sure you use your own charging kit wherever you go. Portable chargers are small enough, and with the advent of MagSafe user-friendly enough, so that there’s really no excuse to be plugging into an unknown charging hub at the airport, train station or hotel lobby.

Share.
Exit mobile version