Injecting Malware into iOS Devices via Malicious Chargers 4 - Pulling off the Mactans AttackYeongjin
Jang and Billy Lau move on with the presentation of the Mactans charger and the
way it can be used to deploy an actual attack on an arbitrary iOS based device.
In this part the researchers show a demo reflecting the actual process where a
legitimate app gets replaced with a malicious one which then gets executed in
the background without user awareness. Additionally, several attack scenarios
are described.
Source:
Injecting Malware into iOS Devices via Malicious Chargers 4 - Pulling off the Mactans Attack