Millions of devices activated with Apple AirPlay can be hacked through Wi-Fi
Apple’s AirPlay feature enables iPhones and MacBooks to play music seamlessly or show photos and videos on other Apple devices or third -party speakers and TVs that integrate the protocol. Now the newly discovered Airplay security defects mean that the same wireless connections can allow hackers to move easily on one network and distribute the malicious code from one infected device to another. Apple products are known for regular reforms, but given that some smart devices are rarely packed at home, it is likely that these active wireless stations for malware will continue in many hundreds of aerial devices for the coming years.
On Tuesday, researchers at Cyber Security Company Oligo revealed what they call Airborne, a set of vulnerabilities affecting air broadcasts, a dedicated radio -based radio protocol for local wireless communications. The drawbacks to the Apple AirPlay software development kit (SDK) for third-party devices allows hackers to hire toys such as speakers, receivers, set boxes or smart TVs if they are on the same Wi-Fi network as a hacker. Apple told Oligo that another set of air vulnerabilities allows hackers to use Apple devices using Airplay, although these bugs have been used in updates over the past few months, and Apple tells Wired that these bugs can only be used if the default playback settings are changed.
The Apple devices, aside, aside, Oligo’s chief technology and founder, Galalbaz, estimates that the number of potentially vulnerable third -party aerial devices is tens of millions. “Since Airplay is supported in such a variety of devices, there are many things that take years for patch – or they never patch,” says al -Baz. “And that’s all because of vulnerability in a piece of software that affects everything.”
Although Oligigo has been working with Apple for months to bring air bugs on all affected devices, Tel-AVIV-based security company warns that air vulnerabilities in many third-party equipment are likely to be hacked unless users are updating them. If a hacker can achieve the same Wi-Fi network like those vulnerable devices-hacking on another computer in a home or corporate network or simply connecting to the same cafe or Wi-Fi airport-they can obtain these devices amazingly. From there, they can use this control to maintain a hidden access point, hack other targets on the network, or add devices to a botnet of coordinated devices under the hacker control.
Oligo also points out that many vulnerable devices have a microphone and can be converted to spyware. The researchers did not go so far as to create a malware for any particular purpose that shows this trick.
Oligo says it warned Apple about its aerial findings in late fall and winter last year, and Apple responded to security updates in the following months. Researchers have collaborated with Apple to test and validate MacS and other Apple products.
Apple tells Wired that it has also created pieces that are affected by third -party devices. The company emphasizes that there are restrictions on the attacks that can be found in AirPlay devices, as an attacker must be on the same Wi-Fi network as a goal for exploiting them. Apple adds: While there are potentially some user data available on devices such as TVs and speakers, it is usually very limited.