April 27, 2015 By Douglas Bonderud 2 min read

Despite stiff competition from other mobile manufacturers, Apple still rules the roost. According to CNN, the company posted its best-ever quarter in the latter part of 2014, selling almost 75 million iPhones in just three months. However, all these devices make for tempting targets. Mobile security firm Skycure has uncovered an iOS 8 vulnerability that leverages fake wireless hot spots and compromised Secure Sockets Layer (SSL) certificates to create a “no iOS zone.”

Stung by SSL?

Using SSL certificates is an industry-standard best practice; almost every app for sale on iTunes uses SSL as a matter of course. According to a recent Skycure blog post, however, Chief Technology Officer Yair Amit and his team uncovered a bug in the certificates being pushed to their Apple devices.

It started when they bought and configured a new wireless router and then noticed apps on iPhones in the room began to crash. After some digging, the security firm found that by using specially crafted SSL certificates, it was possible to create a bug that let attackers crash any SSL-dependent app on command.

What’s more, prolonged use of the device caused iOS to crash, as well. Under certain circumstances, the Skycure team found they could also put the phone into a constant reboot cycle, preventing users from fixing the problem. Of course, this iOS 8 vulnerability depends on a Wi-Fi connection; it’s not possible to manipulate SSL certificates in this way over cellular networks.

Who Watches the Wi-Fi?

Of course, users that rely on cellular connections were unaffected since this SSL-based iOS 8 vulnerability is only exploitable across Wi-Fi connections. However, as noted by CSO Online, that’s no guarantee of safety since many mobile carriers preconfigure smartphones to automatically connect if they’re in range of subscriber networks. To simplify this process, networks have a very limited name set. For instance, in the United Kingdom, devices using Vodafone’s infrastructure will automatically connect to networks named “1WifiVodafone1x” or “Auto-BTWifi.” What’s more, users can’t turn off this feature without completely disabling their Wi-Fi.

This naming scheme makes it easy for cybercriminals to uncover the most common network handles. Using the WiFiGate technique, also discovered by Skycure, attackers could set up a fake network that devices would automatically detect and access. Then, modified SSL certificates could knock out iOS devices and make them unusable. At the coffee shop or restaurant level, this threat amounts to little more than a minor inconvenience, but if deployed in an area that sees heavy mobile use for business — such as Wall Street or Silicon Valley — this iOS 8 vulnerability could become a large-scale distributed denial-of-service attack.

So far, there is no fix for the SSL/WiFiGate flaw, but Skycure is working with Apple to resolve the problem and is keeping mum about some of the more pertinent technical details. No attacks have been reported, but it’s a sobering reminder that secure and familiar doesn’t always mean safe and sound.

Image Source: iStock

More from

Unpacking the NIST cybersecurity framework 2.0

4 min read - The NIST cybersecurity framework (CSF) helps organizations improve risk management using common language that focuses on business drivers to enhance cybersecurity.NIST CSF 1.0 was released in February 2014, and version 1.1 in April 2018. In February 2024, NIST released its newest CSF iteration: 2.0. The journey to CSF 2.0 began with a request for information (RFI) in February 2022. Over the next two years, NIST engaged the cybersecurity community through analysis, workshops, comments and draft revision to refine existing standards…

What should Security Operations teams take away from the IBM X-Force 2024 Threat Intelligence Index?

3 min read - The IBM X-Force 2024 Threat Intelligence Index has been released. The headlines are in and among them are the fact that a global identity crisis is emerging. X-Force noted a 71% increase year-to-year in attacks using valid credentials.In this blog post, I’ll explore three cybersecurity recommendations from the Threat Intelligence Index, and define a checklist your Security Operations Center (SOC) should consider as you help your organization manage identity risk.The report identified six action items:Remove identity silosReduce the risk of…

Obtaining security clearance: Hurdles and requirements

3 min read - As security moves closer to the top of the operational priority list for private and public organizations, needing to obtain a security clearance for jobs is more commonplace. Security clearance is a prerequisite for a wide range of roles, especially those related to national security and defense.Obtaining that clearance, however, is far from simple. The process often involves scrutinizing one’s background, financial history and even personal character. Let’s briefly explore some of the hurdles, expectations and requirements of obtaining a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today