←back to thread

262 points fortran77 | 4 comments | | HN request time: 0.693s | source
Show context
TekMol ◴[] No.42191458[source]
The article sounds like it also applies to iOS

    The company urged users across the Apple
    ecosystem to apply the urgent iOS 18.1.1,
    macOS Sequoia 15.1.1 and the older iOS 17.7.2.
And that it is web based

    maliciously crafted web content may lead
    to arbitrary code execution
Has this happened before? That iPhones had a security hole that could be exploited over the web?
replies(5): >>42191532 #>>42191533 #>>42191570 #>>42191597 #>>42192845 #
e28eta ◴[] No.42191532[source]
Absolutely. I don’t follow the scene, but early in the iphone’s product life I distinctly remember a web-based jailbreak, where you loaded a page and then you could ‘slide to jailbreak’. I don’t know if user action was strictly required, or if it was a UX thing.
replies(1): >>42192094 #
TekMol ◴[] No.42192094[source]
Shouldn't that lead to a massive amount of iPhones being broken into?

If not, why?

If so, what happened to all those phones?

I never hear stories like "My iPhone was broken into and this happened: ..."

replies(4): >>42192219 #>>42192481 #>>42192531 #>>42192745 #
1. TheDong ◴[] No.42192219[source]
Why would it?

Do you regularly visit "hot-iphone-porn-apps.info" and other untrusted sites? Do you expect sites you do visit, like "google.com" or such, are going to serve up malware?

Do you expect hackers who build these very labor-intensive exploit chains will want to try and hit as many low-value targets as possible, leading to apple patching the exploit quickly, or to try and hit high-value targets only so it's not noticed by apple as quickly and can be used against more high-value targets to make more money in total than doing a "spray and pray" with it?

What thought process do you think would lead to using the exploit against as many people as possible vs selling it to zerodium.com or a similar company for more money than you can get from spraying, and then zerodium reselling it to israel to hack into the iphones of a few key palestinians?

replies(3): >>42192501 #>>42193156 #>>42193646 #
2. TekMol ◴[] No.42192501[source]
You are implying that the web based exploits in the history of iOS were not publicly known but only available to very few.

If that holds true, that would be an importent addition to the discussion.

The comment I replied to was about a public website that could jailbreak an iPhone though.

3. ceejayoz ◴[] No.42193156[source]
> Do you expect sites you do visit, like "google.com" or such, are going to serve up malware?

Absolutely. One of the main reasons to run an adblocker. Malicious ads slip through regularly onto entirely reputable sites.

4. acdha ◴[] No.42193646[source]
> Do you expect sites you do visit, like "google.com" or such, are going to serve up malware?

With absolute certainty. Google ads has triggered downloads of Windows executables on NYtimes.com for me before and I am confident attackers will keep trying. The idea that advertisers get to run JavaScript on clients makes that problem effectively unwinnable even though they spend considerable amounts trying to make it hard to slip dodgy code into ads.