Known iOS auto-call feature sparks concerns about unintended dialingsTechnical oversights on the part of some of the iOS ecosystem's most prominent developers — including Facebook and Google — could allow attackers to exploit a documented iOS feature that allows apps to initiate phone calls without a prompt, spurring reminders that iPhone owners should be careful what they tap on.
Romanian developer Andrei Neculaesei discovered that some apps do not properly account for tel: URIs — which pass a telephone number to the handset's dialer much like a mailto: URI would open the Mail app — in embedded web views. Because Apple allows app developers to bypass confirmation prompts when calling the dialer from within their apps, a specially-crafted web page could cause users to initiate telephone or FaceTime calls against their will.
Tapping a malicious link from within the official Gmail app could, for example, force users to call an expensive toll number. Other popular apps affected by the oversight include Facebook Messenger and Google+.
While the issue does not represent a flaw on Apple's part, it seems likely that the company will implement changes to save developers from themselves, perhaps by altering the default behavior of such links to draw a confirmation prompt as they do when tapped in mobile Safari.
Though it is a relatively low-grade problem, it does serve to remind users that they should exercise caution when opening messages or tapping links from people that they do not know. Malware authors depend almost entirely upon consumers' lack of such basic precautions.
On Topic: Security
- Exploit broker triples iOS bounty to $1.5M, cites security improvements and demand
- Apple summons security experts for bug bounty program brief - report
- 'Pegasus' iOS malware package also found to impact OS X, Apple issues patch
- Latest rumor pegs secure iris scanner for Apple's 2017 iPhone
- BitTorrent app Transmission once again source of macOS malware