New Version of 'January 1, 1970 Bug' Can Brick Pre-iOS 9.3.1 Devices Over Compromised Wi-Fi Networks

Security researchers Patrick Kelley and Matt Harrigan have uncovered a new way to exploit the infamous January 1, 1970 bug that was found to be the cause of bricked iPhones in February. Despite Apple's patch of the original issue in iOS 9.3, Kelley and Harrigan discovered the way in which an iPhone constantly looks for trusted Wi-Fi networks could lend itself to the malicious bricking of a Wi-Fi enabled Apple device, without the user even knowing it was happening. iPhone-6s-main-800x337

In a hypothetical example described by Krebs on Security, if a user confirms that a network called "attwifi" is a trusted connection, any subsequent network they come into contact with boasting the same name will connect with their iPhone. That way, when users revisit the same location frequently, they never have to fiddle with going through the Wi-Fi set-up process again. But the feature could be used to silently weaponize the 1970 bug, connecting users to similarly-named networks they've never encountered and altering the date and time stamps of their iOS devices.

In their research, Kelley and Harrigan used this feature of iPhones and iPads to build a nefarious Wi-Fi network, harnessing the requirement of iOS devices to occasionally connect to a network time protocol (NTP) server to keep date and time in sync. Once a user connected to their thought-to-be trusted network, the iPhone would reconfigure its software to update the date and time information from Kelley and Harrigan's own NTP date, which they specified as January 1, 1970.
Harrigan, president and CEO of San Diego-based security firm PacketSled, described the meltdown thusly:

“One thing we noticed was when we set the date on the iPad to 1970, the iPad display clock started counting backwards. While we were plugging in the second test iPad 15 minutes later, the first iPad said it was Dec. 15, 1968. I looked at Patrick and was like, ‘Did you mess with that thing?’ He hadn’t. It finally stopped at 1965, and by that time [the iPad] was about the temperature I like my steak served at.”
Harrigan and Kelley coordinated with Apple when they discovered their findings to avoid preempting the company's promise of a fix for the bug, and possibly encouraging its malicious use in the wild. As such, the company has fixed the issue and anyone running iOS 9.3.1 will be protected from the new iteration of the 1970 bug. Older iOS releases, including the original iOS 9.3 update, are still susceptible, however.

With the release of their research, the two security experts are understandably encouraging users to update their iPhones and iPads as soon as possible, and have created a video to better explain the issue.

Vienici a trovare, cerca la CLINICA®IPHONE più vicino a te

logo_clinica_iphone_bn

App

Siamo Social

CLINICA+IPHONE™ 2009 - 2021 - CLINICA+PHONE®, il logo con la croce +®, iClinica+®, iClinic+®, CLINICA+SMARTPHONE®, CLINICA+®, ICLINICA+PHONE® INSTA BATTERY®, CLINIC+PHONE®, PHONE+CLINIC®, Dr Adriano® e REPAIR GUYS® sono marchi di NEXT S.r.l. e sono registrati in Italia e in altri paesi. Apple, il logo Apple, Apple TV, iPad, iPhone, iPod touch, iTunes e Mac sono marchi di Apple Inc. Questo sito non è in alcun modo affiliato con Apple Inc.

Accettiamo Pagamenti anche con

loghi_carte_gray

Copyright © 2021 CLINICA®IPHONE - Next s.r.l. - P. IVA 12168701006 - Privacy Policy - Note Legali - Codice Etico

× Contattaci su WhatsApp!