Billy Lau, Yeongjin Jang and Chengyu Song demonstrated how an ordinary looking charger can transmit malware, imitate ordinary apps leaving the device unsecure.
Hackers used a Beagleboard (similar to Raspberry Pi) for just roughly $125 in the process.
In one demonstration, researchers managed to completely remove the Facebook iPhone application and install a copy in its place with malicious content.
To complete the exploit, the user just need to enter their device’s passcode when the malicious charger is connected. As long as the app is launched, the malware is also launched and the phone is already compromised.
In such way, depending on the payload attackers have encoded into the imitated app, sensitive data from the device could be accessed in a lot of ways.
Zdnet mentioned, the hackers is now able to take screenshots when other passwords are entered, send a spoofed screen, and more.
The report added that the OS used in the exploit is Linux and Raspberry Pi could also be used instead of Beagleboard. It also added that root access is not needed to complete the exploit.
Other reports confirmed, Apple is already on the way of fixing the security glitch up to developer version iOS 7.