Injecting Malware into iOS Devices via Malicious Chargers 2 - Overview of the Mactans AttackBilly Lau
and his colleague Yeongjin Jang move on with the description of their research,
dwelling on the details of Mactans compromising iDevices. In particular, the hardware
architecture and other essential properties of the tricky charger are provided,
and the algorithm of the attack workflow gets revealed. The process of pairing
with the target device and some probable issues that may occur along the way are
covered herein as well.
Source:
Injecting Malware into iOS Devices via Malicious Chargers 2 - Overview of the Mactans Attack