Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

6/15/2018
01:00 PM
50%
50%

Hackers Crack iPhone Defense Built to Block Forensic Tools

Grayshift, the company behind a system to help police break into iPhones, says it found a workaround for USB Restricted Mode.

Hackers say they found a workaround for USB Restricted Mode, a new security mechanism for the iPhone introduced by Apple in the beta version of iOS 11.3 and headed to its final iOS release. USB Restricted Mode is intended to prevent law enforcement from unlocking an iPhone by turning its lightning cable port into a charge-only port if the device hadn't been unlocked, either by passcode or biometrics, within the previous hour.

USB Restricted Mode would make it harder to crack locked iPhones and force police to rush seized devices to unlocking tools before the time frame ended. The news caused a stir among law enforcement and mobile forensics firms including Grayshift, the company behind GrayKey, a $15,000 unlocking box commonly used by police and other authorities to break into iPhones.

Grayshift has reportedly already defeated USB Restricted Mode in iOS 11.3 beta mode, according to a forensics expert in an email obtained by Motherboard. The same expert says GrayKey has "built in future capabilities that will begin to be leveraged as time goes on." A second source said Grayshift tackled USB Restricted Mode in a webinar many weeks ago.

Law enforcement remains concerned about Apple's update, the report notes.

Read more details here.

 

Top industry experts will offer a range of information and insight on who the bad guys are – and why they might be targeting your enterprise. Click for more information

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
AdamW397
50%
50%
AdamW397,
User Rank: Apprentice
6/26/2018 | 5:23:44 PM
ios security
Normally ios is more secure than others and I also read that all the user information are stored on apple database in encrypted format. But still, there is a possibility to crack the database as well as crack the password. Dell printer Support can help you to secure your phone. The user should follow some instruction to make secure their phone, such as downloading third-party application etc.https://printerchatsupport.co.uk/dell-printer-support/
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-25738
PUBLISHED: 2020-11-27
CyberArk Endpoint Privilege Manager (EPM) 11.1.0.173 allows attackers to bypass a Credential Theft protection mechanism by injecting a DLL into a process that normally has credential access, such as a Chrome process that reads credentials from a SQLite database.
CVE-2020-29144
PUBLISHED: 2020-11-27
In Ericsson BSCS iX R18 Billing & Rating iX R18, MX is a web base module in BSCS iX that is vulnerable to stored XSS via an Alert Dashboard comment. In most test cases, session hijacking was also possible by utilizing the XSS vulnerability. This potentially allows for full account takeover, or e...
CVE-2020-29145
PUBLISHED: 2020-11-27
In Ericsson BSCS iX R18 Billing & Rating iX R18, ADMX is a web base module in BSCS iX that is vulnerable to stored XSS via the name or description field to a solutionUnitServlet?SuName=UserReferenceDataSU Access Rights Group. In most test cases, session hijacking was also possible by utilizing t...
CVE-2020-29136
PUBLISHED: 2020-11-27
In cPanel before 90.0.17, 2FA can be bypassed via a brute-force approach (SEC-575).
CVE-2020-29137
PUBLISHED: 2020-11-27
cPanel before 90.0.17 allows self-XSS via the WHM Transfer Tool interface (SEC-577).