Title :
Exploring an open WiFi detection vulnerability as a malware attack vector on iOS devices
Author :
Spaulding, J. ; Krauss, A. ; Srinivasan, A.
Author_Institution :
Dept. of Comput. Sci., George Mason Univ., Fairfax, VA, USA
Abstract :
This paper presents a vulnerability on devices running Apple iOS, and can be traced back to iOS 3. First discovered in 2009 on iOS, and again in 2011 on Mac OS X, the vulnerability exists in a feature which seeks to help the device user maintain internet connectivity when attached to open WiFi networks protected by a captive portal. Since many modern applications rely on an internet connection, to alert a user when the connection requires user input to proceed, vulnerable OSs periodically check for a connection to the Apple URL http://www.apple.com/library/test/success.html. When the response returned from the connection check is abnormal, a UIWebView instance is opened, allowing the user to accept a terms of service, or otherwise satisfy the Captive Portal or Paywall terms. This behavior allows an adversary a small window of opportunity to launch an attack, which can manifest as an ARP Poisoning Attack, DNS Poisoning Attack, or a Man-in-the-Middle Attack redirecting the requesting iOS device to a malicious location. We have confirmed this vulnerability continues to exist in both iOS 4 and iOS 5. Further we have compared both native as well as jailbroken devices, and successfully launched a BeEF hook to both with equal results. The danger of this vulnerability lies in the fact that no user intervention is requiredfor exploitation beyond initially joining the network, which is a common and generally accepted user activity.
Keywords :
Internet; computer network security; invasive software; mobile computing; operating systems (computers); wireless LAN; ARP poisoning attack; Apple URL; Apple iOS; BeEF hook; DNS poisoning attack; Internet connectivity; Mac OS X; UIWebView instance; captive portal; device user; iOS 3; iOS 4; iOS 5; iOS devices; jailbroken devices; malware attack vector; man-in-the-middle attack; open WiFi detection vulnerability; paywall terms; IEEE 802.11 Standards; Internet; Libraries; Operating systems; Portals; Security;
Conference_Titel :
Malicious and Unwanted Software (MALWARE), 2012 7th International Conference on
Conference_Location :
Fajardo, PR
Print_ISBN :
978-1-4673-4880-5
DOI :
10.1109/MALWARE.2012.6461013