Tuesday, April 15, 2025
HomeHacksiOS Application can Extract Your Geo-Location Details From Image Metadata

iOS Application can Extract Your Geo-Location Details From Image Metadata

Published on

SIEM as a Service

Follow Us on Google News

A malicious iOS app can gain access to image Library and get your location from the image metadata. Which leads to serious privacy issue.

Felix Krause Founder of Fastlane tools found this issue iOS permission issue last week. With this permission issue, any camera app that has access to image library can extract the user locations from the image metadata.

Krause says, there should be an alternate authorization for applications that to choose a photograph and applications that oversee or alter pictures. They’re altogether consolidated under a similar class of permission.

- Advertisement - Google News

Additionally, use of the native image picker should be enforced by Apple, and apps that use a custom one will be rejected.

The app will not edit your photo library in any way – iOS photos permission is smart and only grants immutable access, meaning in theory, the app could add new pictures, but not edit/delete existing ones.

EXIF DATA – Tracking Photos- Image Metadata

EXIF data which is Exchangeable image file format according to Japan Electronic Industries Development Association which specifies the formats for images, sound, and ancillary tags used by digital cameras (including smartphones), scanners and other systems handling image and sound files recorded by digital cameras.

Also Read Tracking Photo’s Geo-location with GPS EXIF DATA – Forensic Analysis

The Exif format has standard tags for location information. As of 2014 many cameras and most mobile phones have a built-in GPS receiver that stores the location information in the Exif header when a picture is taken.

The process of adding geographic information to a photograph is known as geotagging. Photo-sharing communities like Panoramio or Flickr equally allow their users to upload geocoded pictures or to add geolocation information online.

  • Get a past filled with the urban areas, nations, and different spots a client has gone to, as long as they took a photo there
  • Get an entire rundown of the client’s cameras and photography gadgets (which iPhones, Android telephones, cameras) and to what extent they utilized every gadget
  • Discover the client’s work environment, by making sense of where they are from 9 to 5
  • Utilize facial recognization to discover who the client hangs out with and who their accomplice is. Is the client single?

Specifically, an application can get the accompanying information:

  • The correct area of every benefit
  • The physical speed in which the photo/video was taken (how quick did the camera move)
  • The camera shows the correct date + time and other EXIF picture metadata

PoC Code and Demo App by Felix Krause

Felix published PoC and steps to reproduce the issue, also he coded a DetectLocations app which shows your pictures on a map visualized.

Also, it shows pictures that were taken on transport (e.g. car, plane), so it’s easier to find them.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Microsoft Teams File Sharing Unavailable Due to Unexpected Outage

Microsoft Teams users across the globe are experiencing significant disruptions in file-sharing capabilities due...

Cloud Misconfigurations – A Leading Cause of Data Breaches

Cloud computing has transformed the way organizations operate, offering unprecedented scalability, flexibility, and cost...

Security Awareness Metrics That Matter to the CISO

Security awareness has become a critical component of organizational defense strategies, particularly as companies...

New ‘Waiting Thread Hijacking’ Malware Technique Evades Modern Security Measures

Security researchers have unveiled a new malware process injection technique dubbed "Waiting Thread Hijacking"...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Researchers Uncover Hacking Tools and Techniques Shared on Russian-Speaking Cybercrime Forums

Trend Micro, a cybersecurity firm, has released its 50th installment report on the Russian-speaking...

Kellogg’s Servers Breached, Hackers Steal Sensitive Data

WK Kellogg Co., one of the world's leading cereal and snack manufacturers, has fallen...

20-Year-Old Scattered Spider Hacker Pleads Guilty in Major Ransomware Case

A 20-year-old Noah Urban, a resident of Palm Coast, Florida, pleaded guilty to a...