‘Evil Never Sleeps’ iPhone Malware Can Run Even When Your Apple Device is Powered Off Using Bluetooth

Evil Never Sleeps iPhone Malware Apple Off
Just when you thought that Apple devices were safe, ‘Evil Never Sleeps’ iPhone malware comes along, or at least a proof of concept. Yes, it can actually run when your iPhone is powered off because the hardware inside is still running in low-power mode, thus explaining how you’re able to locate it using “Find My” or other tracking tools.

The critical hardware component that this malware uses is the Bluetooth chip, which runs in low-power mode (LPM), along with the chips for near-field communication (NFC) and ultra wideband. These components run for approximately 24-hours after the iPhone has been turned off. Thankfully, this malware is only useful on jailbroken devices, but does show the possibilities of what nefarious developers could do. In somewhat related news, Apple is allegedly already testing USB-C iPhones.


Acer Aspire 5 A515-46-R3UB | 15.6″ Full HD IPS Display | AMD Ryzen 3 3350U Quad-Core Mobile Processor | 4GB DDR4 | 128GB NVMe SSD | WiFi 6 | Backlit KB | FPR | Amazon Alexa | Windows 11 Home in S mode

  • Powerful Productivity: AMD Ryzen 3 3350U delivers desktop-class performance and amazing battery life in a slim notebook. With Precision Boost, get up to 3.5GHz for your high-demand applications
  • Maximized Visuals: See even more on the stunning 15.6″ Full HD display with 82.58% screen-to-body, 16:9 aspect ratio and narrow bezels
  • Backlit Keyboard and Fingerprint Reader: Biometric fingerprint reader and Windows Hello sign-in options help keep your Acer PC secure
  • Internal Specifications: 4GB DDR4 on-board memory (1 slot available); 128GB NVMe solid-state drive storage (1 hard drive bay available) to store your files and media
  • Acer’s Purified.Voice technology, features enhanced digital signal processing to cancel out background noise, improve speech accuracy and far-field pickup, which not only makes calls clearer, but makes talking to Alexa easier than before.

The current LPM implementation on Apple iPhones is opaque and adds new threats. Since LPM support is based on the iPhone’s hardware, it cannot be removed with system updates. Thus, it has a long-lasting effect on the overall iOS security model. To the best of our knowledge, we are the first who looked into undocumented LPM features introduced in iOS 15 and uncover various issues,” said the researchers.

Original Source Link

Next Post