IntoMobile

Breaking news, information, and analysis on the latest mobile phones and mobile technology

Open NavigationOpen Search
  • Home
  • Platforms
    • iOS / iPhone OS
    • Android
    • Windows Phone
    • BlackBerry OS
  • Hardware
    • New Hardware
    • Tablets
    • Reviews
    • Rumors
  • Carriers
    • AT&T
    • Sprint
    • T-Mobile
    • Verizon
  • Manufacturers
    • Apple
    • Samsung
    • HTC
    • LG
    • Motorola
  • Best VPNs
    • Best VPNs for iPhone
    • Best VPNs for Android

Beware the iPhone provisioning file hack!

February 4, 2010 by Will Park - Leave a Comment

Share on Twitter Share on Facebook ( 0 shares )

Screen-shot-2010-02-03-at-February-3-2.51.45-PM1If you’re going about your day thinking your iPhone is as secure as any other smartphone out there, you obviously don’t know about a newly unearthed security flaw that could give hackers control over your Apple iPhone. Turns out, a method for installing new configuration settings on your iPhone could potentially allow hackers to mess around with your WiFi settings and lock you out of email, Safari or other iPhone apps. Hackers have figured out a way to create iPhone configuration provisioning files to look like they’re coming from a legit Apple source, allowing them to trick people into installing some “update” and hand over control of their iPhone to hackers.

The thing is, Apple probably never intended for their configuration provisioning system to be used to hack an iPhone. The purpose of the system is mainly to allow enterprise fleets to quickly configure each iPhone with settings that adhere to some corporate security policy. The method has been exploited by iPhone modders to quickly enable internet tethering on the iPhone, though, so it’s not too surprising that the provisioning file has been hijacked by hackers.

The hack currently making its way around the web is a configuration file that claims to be “verified” as coming from “Apple Computer.” That’s bad news because, well, because who wouldn’t trust an update digitally signed by Apple? Once a user is tricked into installing the file, they essentially hand over control of major iPhone features to the hacker. That allows a hacker to peek inside your data traffic to learn bank account numbers, passwords, and the like. Also, it’s really hard to clean an affected iPhone of the hack without doing a full restore.

Whatever Apple plans to do about the problem, we have one piece of advice that should keep you safe. Do not install anything on your iPhone that you haven’t explicitly requested. Especially if it looks like the image above and to the left.

[Via: MobileCrunch]

Share on Twitter Share on Facebook ( 0 shares )

Back to top ▴

Back to top ▴

Follow IntoMobile

38k
36k
4k
13k
12k

Most Recent Posts

  • iPhone No Sound: Tips on How to Fix this Common Issue
  • The newest iOS – things you surely did not know
  • Transferring money through mobile: Why digital wallets are the future of commerce?
  • Review: Shine laser light Bluetooth headphones
  • Neptune Suite smart watch with phone and tablet screens killing it at Indiegogo

Get Updates Via E-Mail

  • This field is for validation purposes and should be left unchanged.

About IntoMobile

  • About IntoMobile
  • Contact IntoMobile
  • Send us News Tips
  • Privacy Policy

Social Links

  • IntoMobile on Facebook
  • IntoMobile on Twitter
  • IntoMobile on Google+
  • IntoMobile on YouTube

Copyright © 2006-2021 IntoMobile. All rights reserved.