Latest news with #Oligo


Time of India
22-05-2025
- Time of India
Apple's AirPlay system may have major security flaws that can allow hackers to hijack devices, researchers claim
Image credit: Oligo Apple's popular AirPlay feature has been found to contain major security flaws that could leave users vulnerable to hackers, a report claims. Researchers at cybersecurity firm Oligo have discovered that these vulnerabilities could allow attackers to hijack compatible devices connected to the same Wi-Fi network. AirPlay is a protocol that enables users to stream audio, video, or photos seamlessly from their Apple devices to other Apple devices or third-party gadgets that integrate the technology. A total of 23 vulnerabilities, collectively named 'AirBorne,' were reportedly identified. These flaws were present in both Apple's own AirPlay protocol and the AirPlay Software Development Kit (SDK), which third-party vendors use to make their devices compatible. Researchers share a video to show how this security flaw can affect users In their video demonstration, the researchers showed how an attacker on the same network could exploit an AirPlay-enabled Bose speaker, launch a remote code execution (RCE) attack, and display the 'AirBorne' logo on its screen. They warned that a similar technique could feasibly be used to infiltrate any microphone-equipped device for espionage purposes. In a statement to Wired, Oligo CTO Gal Elbaz said that the number of potentially vulnerable devices could be in the millions. 'Because AirPlay is supported in such a wide variety of devices, there are a lot that will take years to patch — or they will never be patched. And it's all because of vulnerabilities in one piece of software that affects everything,' Elbaz explained to Wired. Oligo also disclosed the vulnerabilities to Apple earlier and has been collaborating with the company for several months on patches before releasing their research to the public. Apple even issued updates addressing these issues in March for devices running iOS 18.4, iPadOS 18.4, macOS Ventura 13.7.5, macOS Sonoma 14.7.5, macOS Sequoia 15.4, and visionOS 2.4. However, third-party products that implement the AirPlay protocol are still at risk, as manufacturers have to distribute their firmware updates for users to install to close the exposure. Meanwhile, Apple told Wired that while it has created patches for these third-party devices, it stressed that there are 'limitations' to the attacks that would be possible on AirPlay-enabled devices due to the bugs. The researchers also noted that CarPlay-equipped systems remain at risk, since hackers can carry out an RCE attack if they are nearby and 'the device has a default, predictable, or known Wi-Fi hotspot password.'


Digital Trends
21-05-2025
- Digital Trends
How to keep your Apple devices safe from AirPlay attacks
Apple's approach to building new features has always been rooted in safety and seamless convenience. Take, for example, AirPlay, a wireless standard created by the company that allows users to stream audio and video from one device to another. AirPlay works not just across Apple devices, but also on TVs and speakers cleared by the company to offer the wireless streaming facility. That also makes it a ripe target for attacks, and it seems there are, in fact, vulnerabilities in the wireless lanes that could allow bad actors to seed malware and infect more connected devices. Recommended Videos Understanding the AirPlay risk Experts at the security research firm Oligo recently detailed Airborne, a set of flaws in Apple's AirPlay Protocol and the AirPlay Software Development Kit (SDK) that can allow hackers to remotely execute code. These vulnerabilities can let bad actors take control of devices and use the infected machines to broaden the damage. 'An attacker can take over certain AirPlay-enabled devices and do things like deploy malware that spreads to devices on any local network the infected device connects,' Oligo explained. The risk is huge because there are billions of Apple devices out there that support AirPlay, and millions that are sold by other brands. One of the vulnerabilities could allow hackers to compromise a device and then use it to gain access to a larger network, potentially targeting other devices, too. Depending on the target, the risks range from spying on conversations to tracking a car's location, accessing sensitive information, ransomware attacks, and denial of service. Apple has patched the vulnerabilities via macOS Sequoia 15.4, tvOS 18.4, macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sonoma 14.7.5, iOS 18.4 and iPadOS 18.4, visionOS 2.4 updates. However, there are potentially thousands of older devices that will never get patched and remain vulnerable. What steps do experts suggest? Of course, the first line of defense to protect yourself across all vulnerable devices is to download the fix released by Apple. But that isn't the full picture. Trevor Horwitz, CISO and founder of TrustNet, says the patch will only work if people install it after the package downloads on their device. 'The simplest and most effective thing you can do is keep your devices updated. That sounds basic, but it's often overlooked,' he says. On an iPhone or iPad, follow this route to install the safety update: Settings > General > Software Update. For macOS, you must walk this path: Apple menu > System. Settings > General > Software Update. Since attack vectors like Airborne rely on Wi-Fi networks to expand their damage, you must also pay attention to them. Oleh Kulchytskyi, Senior Malware Reverse Engineer at MacPaw's Moonlock, told DigitalTrends that a Zero-Click Remote Code Execution (RCE) is the highest level of security breach. It should be immediately patched by the companies involved, but as a user, one must take further network-related precautions. 'To stay safe at home, ensure that your router has a strong password and there are no suspicious connections to your network,' Kulchytsky adds. A safe way to AirPlay Matthias Frielingsdorf, a veteran iOS researcher and cofounder of iVerify, tells me that everyone should follow basic digital security protocols. Those include installing updates as soon as they are available, maintaining strong network passwords, and most importantly, reducing the surface area for such attacks. Since AirPlay is the threat vector, users should take proactive steps while using it. 'Disabling this on iOS / macOS / tvOS devices that don't need to be an AirPlay receiver would limit some of the attacks. In public spaces, disabling WiFi on the Mac and iPhone would stop those attacks as well,' says Frielingsdorf. AirPlay streaming is active by default, and as such, you need to disable it. To do so, follow this path on your iPhone or iPad: Settings > General > AirPlay & Continuity > Ask. You can also set it to Never, if you don't actively utilize this feature. There's also an option to set a password, which I recommend that you enable, while at it. What about AirPlay itself? Can it be disabled? Yes, it can be turned off entirely. On your iPhone and iPad, go to the AirPlay & Continuity page and turn off the AirPlay Receiver toggle. Alternatively, you can choose to allow AirPlay only for the Current User, instead of keeping it open to everyone in the range. For Mac users, this is the path you need to follow: Apple Menu > System Settings > General > AirDrop & Handoff > AirPlay Receiver. You can't always patch older or discontinued devices, so it's best to ensure that the machines that are currently in your hands have enabled the right protocols to minimize the risks. The bottom line On multiple occasions in the past, security experts have highlighted flaws in wireless transmission systems, such as Bluetooth. But a vulnerability that allows zero-click remote code execution in AirPlay is a cautionary tale. The message is clear. Apple's security guardrails are solid, but not impenetrable. 'What makes this serious is the integration. AirPlay isn't just a standalone app. It's a system-level service built into iOS, macOS, and tvOS. So the moment that layer is compromised, the attacker could potentially affect multiple devices at once,' TrustNet's Horwitz told Digital Trends. So, where does that leave an average user who is not savvy about security measures? Well, it's time to set aside notions and market perceptions. Chris Hill, Chief Security Strategist at BeyondTrust, says users must understand the threat landscape instead of living with the idea that a certain ecosystem is safer than the rest. 'Threat actors are opportunistic, looking for the easiest path of least resistance, they will find it, and they did in this case with AirPlay and AirBorne,' he warns. The bottom line is that keep your devices updated, disable features you don't use, and be vigilant with network-related settings.
Yahoo
21-05-2025
- Yahoo
Urgent warning to iPhone users: Turn off popular feature and take these steps for safety
Apple's AirPlay feature is beloved by many users — but it can leave you vulnerable to hackers. Researchers at cybersecurity firm Oligo found major security flaws in Apple AirPlay that allow hackers to hijack compatible devices on the same Wi-Fi network. AirPlay allows users to seamlessly stream audio, video or photos from their Apple device to another Apple device or third-party gadgets that integrate the protocol. The 23 vulnerabilities, dubbed 'AirBorne,' were found both in Apple's AirPlay protocol and the AirPlay Software Development Kit (SDK) used by third-party vendors to make devices AirPlay compatible, Wired reported. Researchers demonstrated in a video how vulnerabilities can be exposed to hackers by accessing an AirPlay-enabled Bose speaker on the same network and remotely executing a Remote Code Execution (RCE) attack, showing the 'AirBorne' logo on the speaker's display. They claimed that hackers realistically can use a similar strategy to gain access to devices with microphones for espionage. Oligo CTO Gal Elbaz told Wired that the total number of exposed devices could potentially be in the millions. 'Because AirPlay is supported in such a wide variety of devices, there are a lot that will take years to patch — or they will never be patched,' Elbaz explained. 'And it's all because of vulnerabilities in one piece of software that affects everything.' The risks were reported to Apple in the late fall and winter of last year, and Oligo worked with the tech giant for months on fixes before publishing their findings Tuesday. Apple devices with iOS 18.4, iPadOS 18.4, macOS Ventura 13.7.5, macOS Sonoma 14.7.5, macOS Sequoia 15.4 and visionOS 2.4 had fixes rolled out on March 31. However, third-party devices that support AirPlay protocol remain vulnerable. The researchers said that manufacturers would need to roll out updates for users to install themselves in order to avoid being exposed to hackers. Apple told Wired that it created patches available for these third-party devices, but it emphasized that there are 'limitations' to the attacks that would be possible on AirPlay-enabled devices due to the bugs. CarPlay-equipped systems are also at risk, the researchers noted, since hackers can carry out an RCE attack if they are near the unit and 'the device has a default, predictable, or known Wi-Fi hotspot password.' According to the report, there are several ways to help protect your device from the threat of hackers: Update your devices: Researchers stressed that devices and other machines that support AirPlay need to be updated immediately to the latest software versions to mitigate potential security risks. Disable AirPlay Receiver: Oligo recommends fully disabling the AirPlay feature when not in use. Only AirPlay to trusted devices: Limit AirPlay communication and stream content to only trusted devices. Restrict AirPlay Settings: Go to Settings > AirPlay & Continuity (or AirPlay & Handoff) and select Current User for the 'Allow AirPlay for' option. 'While this does not prevent all of the issues mentioned in the report, it does reduce the protocol's attack surface,' researchers noted. Disable on public Wi-Fi: It's best to avoid enabling or using AirPlay when on a public Wi-Fi network.
Yahoo
21-05-2025
- Yahoo
Urgent warning to iPhone users: Turn off popular feature and take these steps for safety
Apple's AirPlay feature is beloved by many users — but it can leave you vulnerable to hackers. Researchers at cybersecurity firm Oligo found major security flaws in Apple AirPlay that allow hackers to hijack compatible devices on the same Wi-Fi network. AirPlay allows users to seamlessly stream audio, video or photos from their Apple device to another Apple device or third-party gadgets that integrate the protocol. The 23 vulnerabilities, dubbed 'AirBorne,' were found both in Apple's AirPlay protocol and the AirPlay Software Development Kit (SDK) used by third-party vendors to make devices AirPlay compatible, Wired reported. Researchers demonstrated in a video how vulnerabilities can be exposed to hackers by accessing an AirPlay-enabled Bose speaker on the same network and remotely executing a Remote Code Execution (RCE) attack, showing the 'AirBorne' logo on the speaker's display. They claimed that hackers realistically can use a similar strategy to gain access to devices with microphones for espionage. Oligo CTO Gal Elbaz told Wired that the total number of exposed devices could potentially be in the millions. 'Because AirPlay is supported in such a wide variety of devices, there are a lot that will take years to patch — or they will never be patched,' Elbaz explained. 'And it's all because of vulnerabilities in one piece of software that affects everything.' The risks were reported to Apple in the late fall and winter of last year, and Oligo worked with the tech giant for months on fixes before publishing their findings Tuesday. Apple devices with iOS 18.4, iPadOS 18.4, macOS Ventura 13.7.5, macOS Sonoma 14.7.5, macOS Sequoia 15.4 and visionOS 2.4 had fixes rolled out on March 31. However, third-party devices that support AirPlay protocol remain vulnerable. The researchers said that manufacturers would need to roll out updates for users to install themselves in order to avoid being exposed to hackers. Apple told Wired that it created patches available for these third-party devices, but it emphasized that there are 'limitations' to the attacks that would be possible on AirPlay-enabled devices due to the bugs. CarPlay-equipped systems are also at risk, the researchers noted, since hackers can carry out an RCE attack if they are near the unit and 'the device has a default, predictable, or known Wi-Fi hotspot password.' According to the report, there are several ways to help protect your device from the threat of hackers: Update your devices: Researchers stressed that devices and other machines that support AirPlay need to be updated immediately to the latest software versions to mitigate potential security risks. Disable AirPlay Receiver: Oligo recommends fully disabling the AirPlay feature when not in use. Only AirPlay to trusted devices: Limit AirPlay communication and stream content to only trusted devices. Restrict AirPlay Settings: Go to Settings > AirPlay & Continuity (or AirPlay & Handoff) and select Current User for the 'Allow AirPlay for' option. 'While this does not prevent all of the issues mentioned in the report, it does reduce the protocol's attack surface,' researchers noted. Disable on public Wi-Fi: It's best to avoid enabling or using AirPlay when on a public Wi-Fi network.


Dublin Live
21-05-2025
- Dublin Live
iPhone owners given 'important' advice to check their settings immediately
Our community members are treated to special offers, promotions and adverts from us and our partners. You can check out at any time. More info All Apple users must pay attention and make sure they update all of their devices without delay. This latest alert has been raised after security experts at Oligo discovered a number of flaws within Apple's AirPlay technology that could allows hackers to infect phones, tablets and laptops with worrying malware. The attack has been branded "AirBorne" and it's not something anyone should ignore. "The vulnerabilities and the attack vectors they enable have been named "AirBorne" by Oligo Security researchers, as the attacks that they make possible are transmitted via wireless networks or peer–to-peer connections, and allow attackers to fully take over devices and use that access as a launchpad for further exploitation," the Oligo team explained. For those not aware, Apple's AirPlay system allows content to beamed to speakers and TVs wirelessly using Wi-Fi. However, it appears that this wire-free connectivity has also given cyber crooks a way to infect devices. Luckily, Apple has now fixed all of the bugs but it's vital that all users make sure their iPhones, iPads and MacBooks are fully updated with the very latest software. "Researchers have discovered a series of major security flaws in Apple AirPlay," Alanna Titterington from Kaspersky explained. "They've dubbed this family of vulnerabilities – and the potential exploits based on them – "AirBorne". The bugs can be leveraged individually or in combinations to carry out wireless attacks on a wide range of AirPlay-enabled hardware. "The most important thing you can do to protect yourself from AirBorne attacks is to update all your AirPlay-enabled devices." To make sure you are fully up to date, simply head to your Settings, then tap General and Software Update. Your device will show what downloads are impending or if your device is running the latest software. Although this latest attack sounds worrying you will be safe if you have the latest updates from Apple. It's also worth noting that a hack can only take place if the cyber crook is on the same Wi-Fi network which makes it very unlikely consumers will be affected. The only time Apple users might need to be alert is when using a public Wi-Fi network. "To pull off the attack, the adversary needs to be on the same network as the victim, which is realistic if, for example, the victim is connected to public Wi-Fi," Titterington added. For those still concerned, there are some other ways to avoid the issue. This includes disabling the AirPlay receiver if it is not in use., restrict AirPlay access and change the setting to "Allow AirPlay for" to "Current User". Join our Dublin Live breaking news service on WhatsApp. Click this link to receive your daily dose of Dublin Live content. We also treat our community members to special offers, promotions, and adverts from us and our partners. If you don't like our community, you can check out any time you like. If you're curious, you can read our Privacy Notice. For all the latest news from Dublin and surrounding areas visit our homepage.