Registration Become a partner

Truth or myth?

Milan Kyselica - Head of Offensive Department, IstroSec · Mario Minarovský - executive director, CREDIBILIS ·

At the ITAPA conference, ethical hacker Milan Kyselica and moderator Mário Minarovský showed that even the latest iPhone can be fooled — not by clever malware, but by our inattention. All it takes is a single configuration profile downloaded from a suspicious site, and an attacker gains visibility into the phone’s communications. The story is a reminder that in cybersecurity, as in healthcare, prevention is key.

How a profile-based attack works

The user receives a link, for example in an SMS, opens the page, and clicks a button that prompts the download of a “configuration profile.” On the iPhone, you install it via Settings – General – VPN & Device Management; the profile may be signed and appear trustworthy. In reality, it changes the DNS settings and adds a certificate that gives the attacker control over the network layer.

Sometimes a second profile is installed that adds an icon to the Home Screen resembling the App Store icon, but it’s only a shortcut to a website. After these steps, the attacker is already intercepting domain queries and can redirect visits to websites. The demonstration was carried out on an iPhone 15 Pro with iOS 17 — that is, on a fully up-to-date device.

Read more

Mario Minarovský

CREDIBILIS
Mario Minarovský has more than 25 years of experience in the ICT market in the CEE region. During his professional career, he held managerial positions in multinational companies such as Novell, NetIQ, Symbol Technologies, Nortel Networks. His advantage is knowledge of the environment from the manufacturer, through the distributor to the integra…

Milan Kyselica

IstroSec
He works as Lead lead penetration tester at IstroSec. He focuses on red teaming, social engineering and application testing. Previously, he worked as a Penetration tester at CSIRT.SK and then as Head of Offensive Department at a private company. He is interested in bug bounty and responsible disclosure, where he found multiple CVEs in web applic…
Páčil sa ti článok? Zdieľaj ho a povedz o ňom aj ostatným