Recently, Jamf Threat Labs released aPress release, pointing out that they have developed a technique called post-exploit persistence, which can pretend to turn on the airplane mode on the iPhone running iOS 16. The attack relies heavily on SpringBoard, which handles UI elements, and CommCenter, which handles network connections. After a successful attack, iPhone users appear to have turned on Airplane Mode, but have not actually disconnected from WiFi and cellular networks. The purpose of the demonstration of this attack is to make users aware of the existence of this attack so that they can better protect their devices.
The danger of this type of attack is that attackers can continue to gain access to users’ devices and networks without their knowledge. This could result in the user’s personal data being leaked, or used for other malicious purposes. Therefore, users need to take measures to protect their devices.
To prevent this attack, users can take the following measures:
1. Update your device: Make sure you have the latest iOS version installed on your device, as these usually contain security updates and patches to fix bugs.
2. Using VPN: Using a virtual private network (VPN) can encrypt the user’s network traffic, thereby protecting the user’s privacy and security.
3. Turn off WiFi and cellular networks: When users do not need to connect to the network, they can turn off WiFi and cellular networks to prevent attackers from using these networks to access the device.
4. Use security software: Installing security software can help users detect and prevent malware and attacks.
In short, the emergence of this kind of attack reminds users to be vigilant and take measures to protect their devices and privacy. At the same time, manufacturers also need to strengthen the security of devices, repair vulnerabilities and update security patches in time to protect the interests of users.