Endpoint

6/15/2018
01:00 PM
50%
50%

Hackers Crack iPhone Defense Built to Block Forensic Tools

Grayshift, the company behind a system to help police break into iPhones, says it found a workaround for USB Restricted Mode.

Hackers say they found a workaround for USB Restricted Mode, a new security mechanism for the iPhone introduced by Apple in the beta version of iOS 11.3 and headed to its final iOS release. USB Restricted Mode is intended to prevent law enforcement from unlocking an iPhone by turning its lightning cable port into a charge-only port if the device hadn't been unlocked, either by passcode or biometrics, within the previous hour.

USB Restricted Mode would make it harder to crack locked iPhones and force police to rush seized devices to unlocking tools before the time frame ended. The news caused a stir among law enforcement and mobile forensics firms including Grayshift, the company behind GrayKey, a $15,000 unlocking box commonly used by police and other authorities to break into iPhones.

Grayshift has reportedly already defeated USB Restricted Mode in iOS 11.3 beta mode, according to a forensics expert in an email obtained by Motherboard. The same expert says GrayKey has "built in future capabilities that will begin to be leveraged as time goes on." A second source said Grayshift tackled USB Restricted Mode in a webinar many weeks ago.

Law enforcement remains concerned about Apple's update, the report notes.

Read more details here.

 

Top industry experts will offer a range of information and insight on who the bad guys are – and why they might be targeting your enterprise. Click for more information

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
AdamW397
50%
50%
AdamW397,
User Rank: Apprentice
6/26/2018 | 5:23:44 PM
ios security
Normally ios is more secure than others and I also read that all the user information are stored on apple database in encrypted format. But still, there is a possibility to crack the database as well as crack the password. Dell printer Support can help you to secure your phone. The user should follow some instruction to make secure their phone, such as downloading third-party application etc.https://printerchatsupport.co.uk/dell-printer-support/
Understanding Evil Twin AP Attacks and How to Prevent Them
Ryan Orsi, Director of Product Management for Wi-Fi at WatchGuard Technologies,  11/14/2018
Veterans Find New Roles in Enterprise Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/12/2018
To Click or Not to Click: The Answer Is Easy
Kowsik Guruswamy, Chief Technology Officer at Menlo Security,  11/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-19296
PUBLISHED: 2018-11-16
PHPMailer before 5.2.27 and 6.x before 6.0.6 is vulnerable to an object injection attack.
CVE-2018-19301
PUBLISHED: 2018-11-15
tp4a TELEPORT 3.1.0 allows XSS via the login page because a crafted username is mishandled when an administrator later views the system log.
CVE-2018-5407
PUBLISHED: 2018-11-15
Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'.
CVE-2018-14934
PUBLISHED: 2018-11-15
The Bluetooth subsystem on Polycom Trio devices with software before 5.5.4 has Incorrect Access Control. An attacker can connect without authentication and subsequently record audio from the device microphone.
CVE-2018-14935
PUBLISHED: 2018-11-15
The Web administration console on Polycom Trio devices with software before 5.5.4 has XSS.