The Los Angeles Post
California & Local U.S. World Business Lifestyle
Today: December 26, 2024
Today: December 26, 2024

Your iPhone Keyboard Could Be Quietly Betraying Your Private Data

iPhonebeware with iphone keyboards
December 05, 2023
Soren Fallwell - LA Post

A chilling new cyberattack allowing hackers to spy on iPhone users' most sensitive information has security experts sounding the alarm. By weaponizing iOS's third-party custom keyboards to serve as keyloggers, hackers can now covertly monitor every tap and swipe unsuspecting victims make, transmitting back data on private messages, passwords, web activity, and more.

Investigations by security firm Certo Software uncovered these invasive iPhone keyboard hacks in action after helping multiple victims of digital stalking. Their findings reveal a clever technique to bypass Apple's normally rigorous security protections on its devices. Through a multi-stage approach, hackers remotely installed malicious non-Apple keyboards onto targets' iPhones without detection.

The method involves first utilizing Apple's own TestFlight beta testing platform to covertly distribute the malign keyboard app outside normal App Store safeguards. Unlike the strict review process for App Store listings, TestFlight grants developers side access for testing works in progress with select users. However, once installed from there, the hackers configured "Full Access" settings for the spy keyboard to begin logging every keystroke.

With unsanctioned access, the malicious keyboards operate as clandestine background keyloggers, appearing innocuous while duplicating Apple's native keyboard. But every tap gets recorded and sent back to data harvesters to piece together messages, notes, internet activity, and credentials into detailed user profiles.

Because iPhones normally forbid such sweeping permissions, the scheme highlights an overlooked iOS vulnerability now being exploited for harm. The extremity of the intrusion has privacy advocates deeply troubled, given iPhone owners expect Apple's tight control of apps to prevent such privacy pitfalls.

But by repurposing a standard iOS feature like custom keyboards for abuse, the scheme circumvents the App Store gatekeepers. The methodology means any app could potentially deliver remote spyware. "The fact that custom software keyboards allow unlimited access to customize how you type things seems counter to Apple's whole privacy narrative," says security professional Chris Clements.

Researchers emphasize that most third-party iOS keyboards get approved legitimately and don't threaten users. However, slipshod review processes at TestFlight opened the door for malicious code masquerading as harmless tools.

Once transmitted to an iPhone, the rogue keyboards operate beyond detection, capturing vast amounts of sensitive intel like bank accounts, login credentials, and personal messages. Only by fully uninstalling does their reach get severed.

But therein lies an extra sinister brilliance of the attack. Victims never realize their very typing gets monitored by an overlay imitation keyboard duplicating Apple's own ubiquitous design. Without any visible app icon or notification revealing its presence, hackers gain a secret surveillance portal through a common item already installed on millions of iPhones.

"It's almost impossible for a regular user to understand if there’s something malicious installed in their iPhone keyboard,” says Clements.“And that makes it really hard to detect if you don't know what to look for."Already Certo has uncovered multiple victims of cyber stalking linked to similar iPhone keyboard infiltration. But the stealthy spy technique likely reaches far more unsuspecting iPhone owners, given apps distributed through TestFlight need not disclose their data gathering.

That opacity means personal information on entertainment interests, financials, family connections and even intimate communications could already sit in strangers’ databases awaiting misuse bought and sold in the shadows.

“The level of access these keyboards get is shocking,” emphasizes security professional Dennise Abdurahman. “And for cyber criminals that data can prove extremely lucrative.”

With kernel-level access, virtually no iPhone activity goes unseen when one of these hacker Trojan horses infests a device through familiar interfaces like text messaging windows.

Researchers thus urge iPhone owners to check keyboard permissions and remove any unfamiliar or unnecessary third-party items. Tech forum discussions also recommend revoking full access to even reliable keyboards given most operate fine under limited settings.

Meanwhile, pressure mounts for Apple to address lax policing allowing spyware keyboard code to regenerate on platforms like TestFlight despite past purges continually. Critics contend the company’s opacity on data access does little to inform consumers of real privacy risks from iOS features considered harmless.

“It’s a huge threat when the most private aspects of people's lives stored on their iPhones can get completely exposed. So Apple does need to lock this down,” argues researcher Abdurahman. “Or else these sketchy developers will keep finding ways back in."

For now, iPhone users gain protection by switching to Apple's default keyboard, given its data isolation. But the keyboard hacks reveal larger cracks in Apple security where trusted access tools morph secretly into spies. Without transparency on what downloads do behind the scenes, even tech-savvy users struggle to evaluate true app intentions.

In that climate of uncertainty, Riley concludes too much hinges on blind faith that Apple's sealed ecosystem stays impervious. Unfortunately, these latest malicious keyboard findings poke holes in that false sense of safety.

"What's been made very clear is that there are ways for attackers to bypass Apple's security measures and violate user privacy without their knowledge,” Riley says. “So people should be aware this remains a threat.”


The harsh lesson as cyber criminals weaponize Apple’s familiar tools: nowhere now stays truly safe from intrusive eyes tapping along in the key of QWERTY.

Related

Americas|Asia|Business|Technology|World

BYD contractor denies 'slavery-like conditions' claims by Brazilian authorities

Jinjiang Group, a contractor for Chinese electric vehicle maker BYD, said on Thursday Brazilian authorities' portrayal of their employees as "enslaved" was inconsistent

BYD contractor denies 'slavery-like conditions' claims by Brazilian authorities
Asia|Business|Technology|Travel

Japan Airlines was hit by a cyberattack, delaying flights during the year-end holiday season

Japan Airlines has been hit by a cyberattack that caused delays to more than 20 domestic flights, but it managed to restore its systems within hours

Japan Airlines was hit by a cyberattack, delaying flights during the year-end holiday season
Asia|Business|Technology|Travel

JAL's systems back to normal after cyberattack delayed flights

Japan Airlines (JAL) said on Thursday its systems returned to normal, with same-day ticket sales resuming, after a cyberattack delayed some domestic and international flights.

JAL's systems back to normal after cyberattack delayed flights
Europe|Political|Technology|World

Undersea power cable linking Finland and Estonia hit by outage, prompting investigation

Finland’s prime minister says authorities are investigating an interruption in a power cable under the Baltic Sea between his country and Estonia

Undersea power cable linking Finland and Estonia hit by outage, prompting investigation
Share This

Popular

Health|Science|Technology

Woman undergoes 'life-changing' procedure years after epilepsy diagnosis

Woman undergoes 'life-changing' procedure years after epilepsy diagnosis
Asia|Business|Environment|Europe|Technology|US

Five facts about electric vehicles in 2024

Five facts about electric vehicles in 2024
Food|Health|Science|Technology

What if you could rank food by ‘healthiness’ as you shopped? Nutrient profiling systems use algorithms to simplify picking healthy groceries

What if you could rank food by ‘healthiness’ as you shopped? Nutrient profiling systems use algorithms to simplify picking healthy groceries
Science|Technology|World

From new commercial Moon landers to asteroid investigations, expect a slate of exciting space missions in 2025

From new commercial Moon landers to asteroid investigations, expect a slate of exciting space missions in 2025