Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

6/15/2018
01:00 PM
50%
50%

Hackers Crack iPhone Defense Built to Block Forensic Tools

Grayshift, the company behind a system to help police break into iPhones, says it found a workaround for USB Restricted Mode.

Hackers say they found a workaround for USB Restricted Mode, a new security mechanism for the iPhone introduced by Apple in the beta version of iOS 11.3 and headed to its final iOS release. USB Restricted Mode is intended to prevent law enforcement from unlocking an iPhone by turning its lightning cable port into a charge-only port if the device hadn't been unlocked, either by passcode or biometrics, within the previous hour.

USB Restricted Mode would make it harder to crack locked iPhones and force police to rush seized devices to unlocking tools before the time frame ended. The news caused a stir among law enforcement and mobile forensics firms including Grayshift, the company behind GrayKey, a $15,000 unlocking box commonly used by police and other authorities to break into iPhones.

Grayshift has reportedly already defeated USB Restricted Mode in iOS 11.3 beta mode, according to a forensics expert in an email obtained by Motherboard. The same expert says GrayKey has "built in future capabilities that will begin to be leveraged as time goes on." A second source said Grayshift tackled USB Restricted Mode in a webinar many weeks ago.

Law enforcement remains concerned about Apple's update, the report notes.

Read more details here.

 

Top industry experts will offer a range of information and insight on who the bad guys are – and why they might be targeting your enterprise. Click for more information

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
AdamW397
50%
50%
AdamW397,
User Rank: Apprentice
6/26/2018 | 5:23:44 PM
ios security
Normally ios is more secure than others and I also read that all the user information are stored on apple database in encrypted format. But still, there is a possibility to crack the database as well as crack the password. Dell printer Support can help you to secure your phone. The user should follow some instruction to make secure their phone, such as downloading third-party application etc.https://printerchatsupport.co.uk/dell-printer-support/
7 Tips for Choosing Security Metrics That Matter
Ericka Chickowski, Contributing Writer,  10/19/2020
IoT Vulnerability Disclosure Platform Launched
Dark Reading Staff 10/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9994
PUBLISHED: 2020-10-22
A path handling issue was addressed with improved validation. This issue is fixed in iOS 13.5 and iPadOS 13.5, macOS Catalina 10.15.5, tvOS 13.4.5, watchOS 6.2.5. A malicious application may be able to overwrite arbitrary files.
CVE-2020-9997
PUBLISHED: 2020-10-22
An information disclosure issue was addressed with improved state management. This issue is fixed in macOS Catalina 10.15.6, watchOS 6.2.8. A malicious application may disclose restricted memory.
CVE-2020-9927
PUBLISHED: 2020-10-22
A memory corruption issue was addressed with improved input validation. This issue is fixed in macOS Catalina 10.15.6. An application may be able to execute arbitrary code with kernel privileges.
CVE-2020-9928
PUBLISHED: 2020-10-22
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in macOS Catalina 10.15.6. An application may be able to execute arbitrary code with kernel privileges.
CVE-2020-9929
PUBLISHED: 2020-10-22
A memory corruption issue was addressed with improved memory handling. This issue is fixed in macOS Catalina 10.15.6. A local user may be able to cause unexpected system termination or read kernel memory.