{"id":77629,"date":"2018-04-19T10:14:05","date_gmt":"2018-04-19T17:14:05","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=77629"},"modified":"2023-04-11T20:42:53","modified_gmt":"2023-04-12T03:42:53","slug":"ios-trustjacking-how-attackers-can-hijack-your-iphone","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/ios-trustjacking-how-attackers-can-hijack-your-iphone\/","title":{"rendered":"iOS trustjacking: How attackers can hijack your iPhone"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-77677\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/ios-trustjacking-iphone.png\" alt=\"iOS Trustjacking: How Attackers Can Hijack Your iPhone\" width=\"1024\" height=\"566\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/ios-trustjacking-iphone.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/ios-trustjacking-iphone-150x83.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/ios-trustjacking-iphone-300x166.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/ios-trustjacking-iphone-768x425.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/ios-trustjacking-iphone-657x363.png 657w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p>Have you ever plugged in your iPhone to a USB port and tapped &#8220;Trust&#8221; on your screen? You might have unknowingly given an attacker permanent access to your device\u2014even wirelessly, and potentially even remotely.<\/p>\n<p>On Wednesday morning at RSA Conference 2018, two security researchers gave a presentation that has massive security and privacy implications for users of all devices that run Apple&#8217;s iOS operating system: iPhone, iPad, and iPod touch.<\/p>\n<p><em>In this article:<\/em><\/p>\n<ul>\n<li><a href=\"#whatis\">What exactly is the &#8220;trustjacking&#8221; attack?<\/a><\/li>\n<li><a href=\"#near\">Does the attacker have to be near the victim?<\/a>\n<ul>\n<li>Remote attack where the <em>user<\/em> is\u00a0not near\u00a0the trusted computer<\/li>\n<li>Remote attack where the <em>attacker<\/em> is not near the trusted computer<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"#nevertap\">What if I never tap Trust when using someone else&#8217;s computer? Am I safe?<\/a><\/li>\n<li><a href=\"#whydoes\">Why does iOS have a &#8220;Trust This Computer&#8221; dialog box?<\/a><\/li>\n<li><a href=\"#doineedto\">Do I need to tap &#8220;Trust&#8221; to charge my device?<\/a><\/li>\n<li><a href=\"#kiosks\">Are public charging stations safe?<\/a><\/li>\n<li><a href=\"#revoke\">How can I revoke trust from computers I&#8217;ve previously trusted?<\/a><\/li>\n<li><a href=\"#learnmore\">How can I learn more?<\/a><a name=\"whatis\"><\/a><\/li>\n<\/ul>\n<h3>What exactly is the &#8220;trustjacking&#8221; attack?<\/h3>\n<p><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-77647\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/iPhone-X-75x150.png\" alt=\"\" width=\"75\" height=\"150\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/iPhone-X-75x150.png 75w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/iPhone-X-149x300.png 149w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/iPhone-X-768x1542.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/iPhone-X-510x1024.png 510w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/iPhone-X-657x1319.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/iPhone-X.png 931w\" sizes=\"(max-width: 75px) 100vw, 75px\" \/>The security researchers, Adi Sharabani and Roy Iarchy, presented a live demonstration of the attack. Sometime before the presentation, Sharabani had previously connected his iPhone X to Iarchy&#8217;s MacBook and tapped &#8220;Trust&#8221; in a dialog box on the iPhone\u2014something many people do when they connect their iPhone to a computer.<\/p>\n<p>During the presentation, Sharabani used his iPhone X to take a selfie with Iarchy, after which he sent a text message to\u00a0their company&#8217;s CEO.<\/p>\n<p>On the MacBook, Iarchy issued a command to Sharabani&#8217;s iPhone to back up its data over Wi-Fi, which is made possible by an iOS feature called iTunes Wi-Fi Sync, which works on both <a href=\"https:\/\/support.apple.com\/guide\/mac-help\/wi-fi-syncing-mchlada1d602\/mac\" target=\"_blank\" rel=\"noopener\">macOS<\/a> and <a href=\"https:\/\/support.apple.com\/guide\/itunes\/wi-fi-syncing-itns3751d862\/windows\" target=\"_blank\" rel=\"noopener\">Windows<\/a>\u00a0hosts. After the synchronization was complete, Iarchy showed that both the selfie and the text message were easily accessible on his MacBook.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">Great to speak with <a href=\"https:\/\/twitter.com\/royiarchy?ref_src=twsrc%5Etfw\">@royiarchy<\/a> at <a href=\"https:\/\/twitter.com\/hashtag\/RSAConference?src=hash&amp;ref_src=twsrc%5Etfw\">#RSAConference<\/a>. More important, great to see that you finally created a twitter account! <a href=\"https:\/\/t.co\/mK5gW5BZbw\">pic.twitter.com\/mK5gW5BZbw<\/a><\/p>\n<p>\u2014 Adi Sharabani (@adisharabani) <a href=\"https:\/\/twitter.com\/adisharabani\/status\/986655143511769088?ref_src=twsrc%5Etfw\">April 18, 2018<\/a><\/p><\/blockquote>\n<p>The researchers also demonstrated how an attacker could live-stream continuous screenshots from the device, effectively simulating a live video feed of what was on the iPhone&#8217;s screen. Given that iOS briefly shows the most recently typed character in password fields, it&#8217;s possible for an attacker to watch a victim type their banking or other passwords.\u00a0This is effectively a clever, modern way to conduct a &#8220;shoulder surfing&#8221; attack without having to be in the same room as the victim.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" class=\"aligncenter size-large wp-image-77641\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/shoulder-surfing-1024x783.png\" alt=\"\" width=\"1024\" height=\"783\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/shoulder-surfing-1024x783.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/shoulder-surfing-150x115.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/shoulder-surfing-300x229.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/shoulder-surfing-768x587.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/shoulder-surfing-657x502.png 657w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><br \/>\nRemotely observing iOS is a modern version of shoulder surfing.<\/p>\n<p>One of the most concerning attacks enabled by trustjacking that Sharabani and Iarchy demonstrated was the ability to replace an iOS app with a malicious version that had an identical icon, which appeared in the same location as the original. In their demonstration, it took less than a second for the iPhone&#8217;s legitimate Facebook app to get replaced with a repackaged version.<\/p>\n<p>By repackaging an app, an attacker can insert functionality of their choosing, including functions only available via private APIs that Apple doesn&#8217;t allow to be used in App Store apps.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-77644\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/Facebook-iOS-app-icon.png\" alt=\"\" width=\"225\" height=\"224\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/Facebook-iOS-app-icon.png 225w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/Facebook-iOS-app-icon-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/Facebook-iOS-app-icon-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/Facebook-iOS-app-icon-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/Facebook-iOS-app-icon-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/Facebook-iOS-app-icon-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/Facebook-iOS-app-icon-128x128.png 128w\" sizes=\"(max-width: 225px) 100vw, 225px\" \/><\/p>\n<p style=\"text-align: center;\">Is this the real Facebook app or a maliciously modified version?<\/p>\n<p>Imagine, if you will, a couple of scenarios in which replacing an app with a compromised version could be a serious security and privacy concern.<\/p>\n<p><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-76255\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Signal-iOS-icon-150x150.png\" alt=\"\" width=\"120\" height=\"120\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Signal-iOS-icon-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Signal-iOS-icon-300x300.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Signal-iOS-icon-768x768.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Signal-iOS-icon-657x657.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Signal-iOS-icon-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Signal-iOS-icon-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Signal-iOS-icon-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Signal-iOS-icon-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Signal-iOS-icon-128x128.png 128w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Signal-iOS-icon.png 1024w\" sizes=\"(max-width: 120px) 100vw, 120px\" \/>Many people use secure messaging apps, like <a href=\"https:\/\/signal.org\/\" target=\"_blank\" rel=\"noopener\">Signal<\/a>, for instance, to transmit messages that only the recipient can decrypt. If an attacker were to replace your iPhone&#8217;s secure messaging app with a malicious repackaged version, all of your &#8220;secure&#8221; messages could be siphoned off and made available for the attacker\u2014before they were ever encrypted in the first place.<\/p>\n<p>It&#8217;s also possible for repackaged apps to do things like secretly take pictures of you using your front-facing camera, record audio using your microphone, and more; iOS developer Felix Krause shared examples of similar behavior in <a href=\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-october-2017\/\" target=\"_blank\" rel=\"noopener\">October 2017<\/a>.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" class=\"aligncenter size-large wp-image-71815\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Analyze-iOS-user-face-KrauseFx-576x1024.jpg\" alt=\"\" width=\"288\" height=\"512\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Analyze-iOS-user-face-KrauseFx-576x1024.jpg 576w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Analyze-iOS-user-face-KrauseFx-84x150.jpg 84w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Analyze-iOS-user-face-KrauseFx-169x300.jpg 169w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Analyze-iOS-user-face-KrauseFx-657x1169.jpg 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Analyze-iOS-user-face-KrauseFx.jpg 750w\" sizes=\"(max-width: 288px) 100vw, 288px\" \/>Krause shows how a\u00a0hijacked camera can\u00a0reveal a user&#8217;s emotion.<\/p>\n<p>Unlike MacBooks and iMacs, iOS devices do not include camera-in-use indicator lights, so a victim would have no way of knowing that they\u00a0were being spied upon in this manner.<a name=\"near\"><\/a><\/p>\n<h3>Does the attacker have to be near the victim?<\/h3>\n<p>After an iOS user has trusted a computer, at any time in the future that computer can be used to carry out attacks when the device is either connected via USB, or when the iOS device and the computer are connected to the same Wi-Fi wireless network.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-77659\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/trustjacking-attack-wi-fi.png\" alt=\"\" width=\"1316\" height=\"582\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/trustjacking-attack-wi-fi.png 1316w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/trustjacking-attack-wi-fi-150x66.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/trustjacking-attack-wi-fi-300x133.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/trustjacking-attack-wi-fi-768x340.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/trustjacking-attack-wi-fi-1024x453.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/trustjacking-attack-wi-fi-657x291.png 657w\" sizes=\"(max-width: 1316px) 100vw, 1316px\" \/><\/p>\n<p>However, remote attacks are also possible.<\/p>\n<h4><strong>Remote attack where the <em>user<\/em> is\u00a0not near\u00a0the trusted computer<\/strong><\/h4>\n<p><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-77662\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/VPN-iOS-icon-150x80.jpg\" alt=\"\" width=\"150\" height=\"80\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/VPN-iOS-icon-150x80.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/VPN-iOS-icon-300x159.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/VPN-iOS-icon.jpg 398w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>Sharabani and Iarchy have confirmed that it&#8217;s possible to carry out attacks when the iOS device is elsewhere in the world, so\u00a0long as the iOS device is connected to a VPN of the attacker&#8217;s choosing.<\/p>\n<p>This attack scenario requires a combination of trustjacking\u2014the user having once trusted a computer now controlled by the attacker\u2014and what the researchers called a <a href=\"https:\/\/community.broadcom.com\/symantecenterprise\/communities\/community-home\/librarydocuments\/viewdocument?DocumentKey=a193b6c2-97fc-4bda-a525-9b3892e36fbb&amp;CommunityKey=63909be8-ed89-4445-bfd4-55f7374256ce&amp;tab=librarydocuments\" target=\"_blank\" rel=\"noopener nofollow\">malicious profile attack<\/a> (which implies that the victim has fallen for a <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/social-engineering\/\" rel=\"noopener\">social engineering<\/a> attack and installed a mobileconfig profile created by the attacker).<\/p>\n<h4><strong>Remote attack where the <em>attacker<\/em> is not near the trusted computer<\/strong><\/h4>\n<p>If an attacker has compromised (hacked into) a trusted computer, then the attacker could potentially\u00a0execute\u00a0an attack\u00a0from a remote location, as explained below.<a name=\"nevertap\"><\/a><\/p>\n<h3>What if I never tap Trust when using someone else&#8217;s computer? Am I safe?<\/h3>\n<p><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-77665\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/unsecured-iMac-150x124.png\" alt=\"\" width=\"150\" height=\"124\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/unsecured-iMac-150x124.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/unsecured-iMac-300x249.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/unsecured-iMac.png 490w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>Sharabani and Iarchy also described an attack scenario in which a legitimately trusted computer\u2014perhaps the victim&#8217;s home computer\u2014had become compromised by an attacker. If an attacker can surreptitiously control a compromised computer from a remote location, then the attacker could carry out these attacks from anywhere in the world.<\/p>\n<p>Thus, it&#8217;s important to maintain the security of your own Mac or Windows PC that you&#8217;ve allowed\u00a0your iOS device to trust.<a name=\"whydoes\"><\/a><\/p>\n<h3>Why does iOS have a &#8220;Trust This Computer&#8221; dialog box?<\/h3>\n<p>The first time\u00a0a computer\u00a0attempts to access data from your iPhone or other iOS device, you will see a dialog box on your device&#8217;s screen, which\u00a0says, &#8220;Trust This Computer? Your settings and data will be accessible from this computer when connected.&#8221; The dialog box presents\u00a0two options: &#8220;Trust&#8221; and &#8220;Don&#8217;t Trust.&#8221;<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-70144\" title=\"Trust This Computer? Your settings and data will be accessible from this computer when connected. [Trust] [Don't Trust]\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/ios10-iphone7-trust-computer-alert.jpg\" alt=\"Trust This Computer? Your settings and data will be accessible from this computer when connected. [Trust] [Don't Trust]\" width=\"395\" height=\"229\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/ios10-iphone7-trust-computer-alert.jpg 395w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/ios10-iphone7-trust-computer-alert-150x87.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/ios10-iphone7-trust-computer-alert-300x174.jpg 300w\" sizes=\"(max-width: 395px) 100vw, 395px\" \/>The iOS &#8220;Trust This Computer?&#8221; dialog box<\/p>\n<p>By displaying this prompt, Apple gives iOS users the choice whether the\u00a0connected computer should be\u00a0allowed to access the device&#8217;s settings and data.<\/p>\n<p>However, the dialog box\u00a0implies that it&#8217;s necessary for there to be a physical connection between the iOS device and the computer via a Lightning to USB cable. Most iOS device users are unaware that &#8220;connected&#8221; can also mean &#8220;on the same Wi-Fi network.&#8221;<\/p>\n<p>As of iOS 11, tapping Trust now requires you to enter your device&#8217;s unlock passcode. According to Sharabani and Iarchy, Apple implemented this mitigation after the researchers began working with Apple to disclose the vulnerability in July 2017. Even so, many users do not understand the nature or degree of the trusted relationship, and may be trusting computers too freely.<a name=\"doineedto\"><\/a><\/p>\n<h3>Do I need to tap &#8220;Trust&#8221; to charge my device?<\/h3>\n<p><strong><img loading=\"lazy\" class=\"alignright size-medium wp-image-77650\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/iPhone-charging-300x230.jpg\" alt=\"\" width=\"300\" height=\"230\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/iPhone-charging-300x230.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/iPhone-charging-150x115.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/iPhone-charging-768x588.jpg 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/iPhone-charging-1024x784.jpg 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/iPhone-charging-657x503.jpg 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/iPhone-charging.jpg 1274w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>No! <\/strong>If all you want to do is charge your device&#8217;s battery, <strong>you should always tap the &#8220;Don&#8217;t Trust&#8221; button<\/strong>, <em>not<\/em> the\u00a0&#8220;Trust&#8221; button. Charging your battery does <em>not<\/em> require a trusted relationship.<\/p>\n<p>If you decide later that you need to exchange data between your iOS device and a computer you had previously chosen not to trust, simply reconnect your device via USB and you&#8217;ll be presented with the &#8220;Trust This Computer?&#8221; dialog box again.<a name=\"kiosks\"><\/a><\/p>\n<h3>Are public charging stations safe?<\/h3>\n<p>If you ever connect your iPhone to something that doesn&#8217;t appear to be a computer, for example a public charging station, you shouldn&#8217;t get a &#8220;Trust This Computer?&#8221; prompt. If you see such a prompt at a public charging kiosk, you may in reality be connected to a hidden computer on the other end\u2014one that&#8217;s designed to steal data from connected devices while they&#8217;re charging.<\/p>\n<p>The safest solution is to avoid public charging terminals altogether. They can potentially attempt to hack your device, via methods similar to those described in this article. Even a seemingly innocuous-looking cable can potentially try to hijack your device, as discussed in <a href=\"https:\/\/podcast.intego.com\/124\">episode 124<\/a> of the Intego Mac Podcast (from 20:47 to 22:02). There are other potential non-security concerns as well, such as the possibility of a malfunctioning cable, charger, or electrical outlet that can cause a short and physically damage your device.<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/player.fireside.fm\/v2\/GegHgcrH+ot0IMG37?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><a name=\"revoke\"><\/a><\/p>\n<h3>How can I revoke trust from computers I&#8217;ve previously trusted?<\/h3>\n<p><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-77653\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/thinking-person-112x150.png\" alt=\"\" width=\"112\" height=\"150\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/thinking-person-112x150.png 112w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/thinking-person-224x300.png 224w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/thinking-person-768x1030.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/thinking-person-763x1024.png 763w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/thinking-person-657x882.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/thinking-person.png 954w\" sizes=\"(max-width: 112px) 100vw, 112px\" \/>After learning about this attack, you may find yourself trying to remember how many computers you&#8217;ve previously trusted when you probably didn&#8217;t need to, or that should no longer have a trusted relationship with your iOS device.<\/p>\n<p>Unfortunately, Apple does not offer users a way to see a list of all computers to which they&#8217;ve previously connected their iOS device, which means you cannot selectively revoke trust from individual computers.<\/p>\n<p>What you can do instead is to mass-revoke trust from all previously connected computers by going into the <strong>Settings<\/strong> app, tapping <strong>General<\/strong>, <strong>Reset<\/strong>, and then <strong>Reset Location &amp; Privacy<\/strong>.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-77656\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/Reset-Location-and-Privacy.png\" alt=\"\" width=\"375\" height=\"470\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/Reset-Location-and-Privacy.png 750w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/Reset-Location-and-Privacy-120x150.png 120w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/Reset-Location-and-Privacy-239x300.png 239w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/Reset-Location-and-Privacy-657x823.png 657w\" sizes=\"(max-width: 375px) 100vw, 375px\" \/><\/p>\n<p style=\"text-align: center;\">&#8220;Reset Location &amp; Privacy&#8221; untrusts all previously trusted computers.<\/p>\n<p>Note that this has some temporarily inconvenient side effects; for example, you&#8217;ll need to individually reauthorize each and every app to know your location or to use your camera. However, the minor inconvenience is well worth\u00a0it to\u00a0protect your security and privacy.<a name=\"learnmore\"><\/a><\/p>\n<h3>How can I learn more?<\/h3>\n<p>For more information about trustjacking, including some video demonstrations, you can read <a href=\"https:\/\/symantec-enterprise-blogs.security.com\/blogs\/feature-stories\/ios-trustjacking-dangerous-new-ios-vulnerability\" target=\"_blank\" rel=\"noopener nofollow\">Iarchy&#8217;s blog post<\/a>. We also discussed trustjacking on <a href=\"https:\/\/podcast.intego.com\/28\">episode 28<\/a> of the Intego Mac Podcast.<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/player.fireside.fm\/v2\/GegHgcrH+hB66I-Fu?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, including security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Twitter-logo-icon-64.png\" alt=\"Follow Intego on Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Facebook-logo-icon-64.png\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/YouTube-logo-icon-64.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Pinterest-logo-icon-64.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/LinkedIn-logo-icon-64.png\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Instagram-logo-icon-64.png\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: x-small;\">iPhone X image by <a href=\"https:\/\/pixabay.com\/en\/iphone-iphone-x-mockup-mobile-2854305\/\" target=\"_blank\" rel=\"noopener\">Rani Ramli<\/a>. Charging iPhone battery image\u00a0by\u00a0<a href=\"https:\/\/pixabay.com\/en\/technology-digital-online-hand-2752109\/\" target=\"_blank\" rel=\"noopener\">rawpixel<\/a>. Shoulder surfing image compiled by Josh Long,\u00a0based on sitting geek image\u00a0via\u00a0<a href=\"https:\/\/pixabay.com\/en\/computer-man-workstation-business-303129\/\" target=\"_blank\" rel=\"noopener\">Pixabay<\/a> and standing person image by <a href=\"https:\/\/commons.wikimedia.org\/wiki\/File:OsteoCutout.png\" target=\"_blank\" rel=\"noopener\">James Heilman, MD<\/a>. iMac image by <a href=\"https:\/\/commons.wikimedia.org\/wiki\/File:IMac_vector.svg\" target=\"_blank\" rel=\"noopener\">Rafael Fernandez<\/a>. Wi-Fi icon image via <a href=\"https:\/\/www.brandeps.com\/icon\/W\/Wifi-01\" target=\"_blank\" rel=\"noopener\">BrandEPS<\/a>.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Have you ever plugged in your iPhone to a USB port and tapped &#8220;Trust&#8221; on your screen? You might have unknowingly given an attacker permanent access to your device\u2014even wirelessly, and potentially even remotely. On Wednesday morning at RSA Conference 2018, two security researchers gave a presentation that has massive security and privacy implications for [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":77674,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[151,13,5],"tags":[69,1645,8,9,70,3298,4078,143],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Have you ever plugged in your iPhone to a USB port and tapped &quot;Trust&quot; on your screen? You might have unknowingly given an attacker permanent access to\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/ios-trustjacking-how-attackers-can-hijack-your-iphone\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"iOS trustjacking: How attackers can hijack your iPhone - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Have you ever plugged in your iPhone to a USB port and tapped &quot;Trust&quot; on your screen? You might have unknowingly given an attacker permanent access to\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/ios-trustjacking-how-attackers-can-hijack-your-iphone\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2018-04-19T17:14:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-12T03:42:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/trustjacking-iphone-hack.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ios-trustjacking-how-attackers-can-hijack-your-iphone\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/trustjacking-iphone-hack.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/trustjacking-iphone-hack.png\",\"width\":400,\"height\":260,\"caption\":\"iOS Trustjacking iPhone Hack\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ios-trustjacking-how-attackers-can-hijack-your-iphone\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/ios-trustjacking-how-attackers-can-hijack-your-iphone\/\",\"name\":\"iOS trustjacking: How attackers can hijack your iPhone - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ios-trustjacking-how-attackers-can-hijack-your-iphone\/#primaryimage\"},\"datePublished\":\"2018-04-19T17:14:05+00:00\",\"dateModified\":\"2023-04-12T03:42:53+00:00\",\"description\":\"Have you ever plugged in your iPhone to a USB port and tapped \\\"Trust\\\" on your screen? You might have unknowingly given an attacker permanent access to\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ios-trustjacking-how-attackers-can-hijack-your-iphone\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/ios-trustjacking-how-attackers-can-hijack-your-iphone\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ios-trustjacking-how-attackers-can-hijack-your-iphone\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"iOS trustjacking: How attackers can hijack your iPhone\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ios-trustjacking-how-attackers-can-hijack-your-iphone\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ios-trustjacking-how-attackers-can-hijack-your-iphone\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"iOS trustjacking: How attackers can hijack your iPhone\",\"datePublished\":\"2018-04-19T17:14:05+00:00\",\"dateModified\":\"2023-04-12T03:42:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ios-trustjacking-how-attackers-can-hijack-your-iphone\/#webpage\"},\"wordCount\":1733,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ios-trustjacking-how-attackers-can-hijack-your-iphone\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/trustjacking-iphone-hack.png\",\"keywords\":[\"iOS\",\"iOS Vulnerability\",\"iPad\",\"iPhone\",\"iPod\",\"RSA Conference\",\"Trustjacking\",\"Vulnerabilities\"],\"articleSection\":[\"Recommended\",\"Security &amp; Privacy\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/ios-trustjacking-how-attackers-can-hijack-your-iphone\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Have you ever plugged in your iPhone to a USB port and tapped \"Trust\" on your screen? You might have unknowingly given an attacker permanent access to","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/ios-trustjacking-how-attackers-can-hijack-your-iphone\/","og_locale":"en_US","og_type":"article","og_title":"iOS trustjacking: How attackers can hijack your iPhone - The Mac Security Blog","og_description":"Have you ever plugged in your iPhone to a USB port and tapped \"Trust\" on your screen? You might have unknowingly given an attacker permanent access to","og_url":"https:\/\/www.intego.com\/mac-security-blog\/ios-trustjacking-how-attackers-can-hijack-your-iphone\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2018-04-19T17:14:05+00:00","article_modified_time":"2023-04-12T03:42:53+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/trustjacking-iphone-hack.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/ios-trustjacking-how-attackers-can-hijack-your-iphone\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/trustjacking-iphone-hack.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/trustjacking-iphone-hack.png","width":400,"height":260,"caption":"iOS Trustjacking iPhone Hack"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/ios-trustjacking-how-attackers-can-hijack-your-iphone\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/ios-trustjacking-how-attackers-can-hijack-your-iphone\/","name":"iOS trustjacking: How attackers can hijack your iPhone - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/ios-trustjacking-how-attackers-can-hijack-your-iphone\/#primaryimage"},"datePublished":"2018-04-19T17:14:05+00:00","dateModified":"2023-04-12T03:42:53+00:00","description":"Have you ever plugged in your iPhone to a USB port and tapped \"Trust\" on your screen? You might have unknowingly given an attacker permanent access to","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/ios-trustjacking-how-attackers-can-hijack-your-iphone\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/ios-trustjacking-how-attackers-can-hijack-your-iphone\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/ios-trustjacking-how-attackers-can-hijack-your-iphone\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"iOS trustjacking: How attackers can hijack your iPhone"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/ios-trustjacking-how-attackers-can-hijack-your-iphone\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/ios-trustjacking-how-attackers-can-hijack-your-iphone\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"iOS trustjacking: How attackers can hijack your iPhone","datePublished":"2018-04-19T17:14:05+00:00","dateModified":"2023-04-12T03:42:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/ios-trustjacking-how-attackers-can-hijack-your-iphone\/#webpage"},"wordCount":1733,"commentCount":2,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/ios-trustjacking-how-attackers-can-hijack-your-iphone\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/trustjacking-iphone-hack.png","keywords":["iOS","iOS Vulnerability","iPad","iPhone","iPod","RSA Conference","Trustjacking","Vulnerabilities"],"articleSection":["Recommended","Security &amp; Privacy","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/ios-trustjacking-how-attackers-can-hijack-your-iphone\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/trustjacking-iphone-hack.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-kc5","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/77629"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=77629"}],"version-history":[{"count":18,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/77629\/revisions"}],"predecessor-version":[{"id":97700,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/77629\/revisions\/97700"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/77674"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=77629"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=77629"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=77629"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}