Blog | G5 Cyber Security

Detecting iPhone Firmware Toolkit (NightSkies)

TL;DR

Detecting a toolkit like NightSkies on an iPhone is difficult without jailbreaking or advanced forensic tools. However, you can look for unusual activity in your system logs, check installed profiles and configurations, and monitor network traffic for suspicious connections. This guide provides steps to help identify potential compromise.

Checking for Unusual Activity

  1. Check Installed Profiles: Toolkits often install configuration profiles.
    • Go to Settings > General > VPN & Device Management (or just Profiles on older iOS versions).
    • Look for any profiles you didn’t intentionally install. Pay close attention to the profile name and issuer. If it looks suspicious, remove it.
  2. Review System Logs: While complex, logs can reveal clues.
    • Connect your iPhone to a Mac computer.
    • Open Console (Applications > Utilities).
    • Search for keywords related to the toolkit or unusual processes. This requires some technical knowledge of iOS system behaviour. Look for errors, crashes, or unexpected activity around dates you suspect compromise occurred.
  3. Examine Crash Logs: Toolkits can sometimes cause apps to crash.
    • Go to Settings > Privacy & Security > Analytics & Improvements > Analytics Data.
    • Look for frequent crashes of system processes or apps you rarely use.

Network Monitoring

  1. Check Connected Networks: Look for networks you haven’t joined.
    • Go to Settings > Wi-Fi and review the list of known networks.
    • If you see unfamiliar networks, it could indicate a rogue access point used by the toolkit.
  2. Use a Packet Capture Tool (Advanced): Tools like Wireshark can analyze network traffic.
    • This requires technical expertise and a computer to capture the data.
    • Look for connections to unusual IP addresses or domains associated with known malicious activity.

Checking System Files (Requires Jailbreak – Use Caution!)

Warning: Jailbreaking voids your warranty and introduces security risks. Proceed only if you understand the implications.

  1. File System Inspection: After jailbreaking, use a file manager like Filza to examine system directories.
    • Look for unexpected files or folders in locations like /Library/LaunchDaemons, /Library/PreferencePanels, and /System/Library/Extensions.
    • Compare the files with a known good iPhone of the same model and iOS version (if possible).

Using Mobile Security Frameworks (Advanced)

Warning: Requires significant technical expertise.

  1. Frida or similar tools: These frameworks allow you to hook into running processes and inspect their behaviour.
    • You can use them to identify suspicious function calls or data manipulation.
    • Requires knowledge of reverse engineering and iOS internals.

Important Considerations

Exit mobile version