Apple iOS 14 introduces BlastDoor Sandbox security system to iMessage

By Digit NewsDesk | Published on 30 Jan 2021
HIGHLIGHTS
  • Apple introduced BlastDoor sandbox to iMessage source code with iOS 14.

  • BlastDoor Sandbox parses all iMessage content in an isolated sandbox.

Apple iOS 14 introduces BlastDoor Sandbox security system to iMessage
Apple has introduced the BlastDoor Sandbox to the iMessage framework in iOS in order to prevent execution of malicious code.

In the past, there have been various instances where security researchers revealed that a “string of texts” received over SMS could crash your phone or worse, send it into a boot-loop. These kinds of exploits have been reported at least once every year for both iOS and Android smartphones but turns out, iOS 14 has a way to thwarting these kinds of exploits for good, thanks to a system called BlastDoor.

Discovered by a Google Project Zero researched named Samuel Groß, BlastDoor works by parsing all the data contained in an iMessage in a secure sandbox, isolated from the rest of the operating system. By doing so, the contents of the iMessage, if nefarious, won’t have an impact on the OS. All apps installed on an iOS device exist in their own sandboxes, which governed by very tight policies. The BlastDoor sandbox for iMessage has been designed to thwart most exploits which either use brute force or exploit the shared cache on iOS.  Groß says he found the existence of BlastDoor when investigating a hacking campaign against Al Jazeera journalists. There were instances where the hacks did not work and the common thread appeared to be the fact that they were running iOS 14 on their iPhones.

While BlastDoor sandbox definitely makes iMessage more secure, it does not do much for the traditional SMS. Last year in April 2020, a text-based exploit was discovered which could be initiated via a normal SMS. A string of characters written in Sindhi when received as an SMS would freeze iOS completely, rendering the person’s iPhone/iPad completely useless till the OS would crash, and the device could be rebooted. This was due to a bug in iOS, one which Apple has since fixed, but it highlights how the short messaging service format is still a likely vector for delivering exploits.

Messaging apps have been a popular point of intrusion into smartphones for several years now. We’ve seen text message string crash phones, brick them permanently, lock them temporarily, and in one case, even serve as a means of gaining full access to the device. The now infamous Pegasus used a vulnerability in WhatsApp, allowing the hacker full access to a target smartphone, all done remotely. The BlastDoor sandbox for iMessage introduced in iOS14 should prevent some, if not all intrusion and malicious events.

logo
Digit NewsDesk

The guy who answered the question 'What are you doing?' with 'Nothing'.

email

Advertisements

Trending Articles

Advertisements

LATEST ARTICLES View All

Advertisements

Hot Deals View All

Redmi 9 Power (Electric Green, 4GB RAM, 64GB Storage) - 6000mAh Battery | 48MP Quad Camera
Redmi 9 Power (Electric Green, 4GB RAM, 64GB Storage) - 6000mAh Battery | 48MP Quad Camera
₹ 10499 | $hotDeals->merchant_name
Samsung Galaxy M21 (Midnight Blue, 4GB RAM, 64GB Storage)
Samsung Galaxy M21 (Midnight Blue, 4GB RAM, 64GB Storage)
₹ 13999 | $hotDeals->merchant_name
Samsung Galaxy M31 (Space Black, 6GB RAM, 64GB Storage)
Samsung Galaxy M31 (Space Black, 6GB RAM, 64GB Storage)
₹ 15999 | $hotDeals->merchant_name
Redmi Note 9 Pro Max Interstellar Black 6GB|64GB
Redmi Note 9 Pro Max Interstellar Black 6GB|64GB
₹ 14999 | $hotDeals->merchant_name
Realme 7 Pro Mirror Silver 6GB |128GB
Realme 7 Pro Mirror Silver 6GB |128GB
₹ 19999 | $hotDeals->merchant_name
DMCA.com Protection Status