City
Epaper

Researchers rename iPhone, Tesla to reveal remote server details

By IANS | Updated: December 14, 2021 10:35 IST

San Francisco, Dec 14 Cyber security researchers have discovered that changing the device name of an iPhone or ...

Open in App

San Francisco, Dec 14 Cyber security researchers have discovered that changing the device name of an iPhone or a Tesla in the settings reveals remote server details, indicating that the server at the other end is vulnerable to the most serious Internet bug called 'Log4Shell'.

In demonstrations, researchers changed the device names to a "string of characters" that would send servers to a testing URL, reports The Verge.

"After the name was changed, incoming traffic showed URL requests from IP addresses belonging to Apple and, in the case of Tesla, China Unicom the company's mobile service partner for the Chinese market," the report said late on Monday.

The team of researchers actually tricked Apple and Tesla servers into visiting a URL of their choice.

A Dutch security researcher demonstrated the iPhone server details.

"An attacker could host malicious code at the target URL in order to infect vulnerable servers, but a well-maintained network could prevent such an attack at the network level," the report noted.

Cyber security researchers have warned that hackers are making over 100 attempts every minute to exploit a critical security vulnerability in the widely-used Java logging system called 'Apache log4j2', leaving millions of companies globally at cyber theft risk.

Several popular services, including Apple iCloud, Amazon, Twitter, Cloudflare and Minecraft, are vulnerable to this 'ubiquitous' zero-day exploit, now dubbed as one of the most serious vulnerabilities on the Internet in recent years.

'Apache Log4j' is used in many forms of enterprise and open-source software, including cloud platforms, web applications and email services.

Apache Log4j is the most popular java logging library with over 400,000 downloads from its GitHub project. It is used by a vast number of companies worldwide, enabling logging in a wide set of popular applications.

"Exploiting this vulnerability is simple and allows threat actors to control java-based web servers and launch remote code execution attacks," cyber security researchers said in a blog post.

Researchers at Microsoft have also warned about attacks attempting to take advantage of 'Log4j' vulnerabilities, including a range of crypto-mining malware.

Disclaimer: This post has been auto-published from an agency feed without any modifications to the text and has not been reviewed by an editor

Tags: Tesla, china unicomappleSupport companyApple educationApple app storesStoreApple india store onlineIhhaApple inc.E-heli serviceKnowledge plus inc
Open in App

Related Stories

MumbaiApple Opens Second Mumbai Store at Sky City Mall, Borivali; Expands Retail Presence in India

TechnologyiOS 26.2 Update: New Privacy Controls, Smarter Notifications; All You Need to Know About Latest iPhone OS Features

NationalApple Opposes Mandatory Cyber App Installation Amid Surveillance Concerns

TechnologyApple Layoffs: iPhone Maker Cuts Jobs Across Sales Segment, Says Report

TechnologyIT Layoffs 2025: Microsoft, Google, Apple Among 284 Tech Companies That Cut Jobs in First 5 Months

Technology Realted Stories

TechnologyMinistry of Social Justice clocks highest-ever Rs 11,810 crore expenditure in FY26

TechnologyFuel supplies adequate, no need to panic: IOCL

TechnologyGovt working to minimise supply chain impact, pharma sector unaffected: Commerce Secretary

TechnologyNITI Aayog launches ATL Sarthi, Mentor India Academy to deepen school‑level innovation

Technology21 states carrying out press briefs to counter misinformation around LPG: Centre