Endpoint

6/15/2018
01:00 PM
50%
50%

Hackers Crack iPhone Defense Built to Block Forensic Tools

Grayshift, the company behind a system to help police break into iPhones, says it found a workaround for USB Restricted Mode.

Hackers say they found a workaround for USB Restricted Mode, a new security mechanism for the iPhone introduced by Apple in the beta version of iOS 11.3 and headed to its final iOS release. USB Restricted Mode is intended to prevent law enforcement from unlocking an iPhone by turning its lightning cable port into a charge-only port if the device hadn't been unlocked, either by passcode or biometrics, within the previous hour.

USB Restricted Mode would make it harder to crack locked iPhones and force police to rush seized devices to unlocking tools before the time frame ended. The news caused a stir among law enforcement and mobile forensics firms including Grayshift, the company behind GrayKey, a $15,000 unlocking box commonly used by police and other authorities to break into iPhones.

Grayshift has reportedly already defeated USB Restricted Mode in iOS 11.3 beta mode, according to a forensics expert in an email obtained by Motherboard. The same expert says GrayKey has "built in future capabilities that will begin to be leveraged as time goes on." A second source said Grayshift tackled USB Restricted Mode in a webinar many weeks ago.

Law enforcement remains concerned about Apple's update, the report notes.

Read more details here.

 

Top industry experts will offer a range of information and insight on who the bad guys are – and why they might be targeting your enterprise. Click for more information

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
AdamW397
50%
50%
AdamW397,
User Rank: Apprentice
6/26/2018 | 5:23:44 PM
ios security
Normally ios is more secure than others and I also read that all the user information are stored on apple database in encrypted format. But still, there is a possibility to crack the database as well as crack the password. Dell printer Support can help you to secure your phone. The user should follow some instruction to make secure their phone, such as downloading third-party application etc.https://printerchatsupport.co.uk/dell-printer-support/
Microsoft President: Governments Must Cooperate on Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/8/2018
To Click or Not to Click: The Answer Is Easy
Kowsik Guruswamy, Chief Technology Officer at Menlo Security,  11/14/2018
Veterans Find New Roles in Enterprise Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/12/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-19279
PUBLISHED: 2018-11-14
PRIMX ZoneCentral before 6.1.2236 on Windows sometimes leaks the plaintext of NTFS files. On non-SSD devices, this is limited to a 5-second window and file sizes less than 600 bytes. The effect on SSD devices may be greater.
CVE-2018-19280
PUBLISHED: 2018-11-14
Centreon 3.4.x has XSS via the resource name or macro expression of a poller macro.
CVE-2018-19281
PUBLISHED: 2018-11-14
Centreon 3.4.x allows SNMP trap SQL Injection.
CVE-2018-17960
PUBLISHED: 2018-11-14
CKEditor 4.x before 4.11.0 allows user-assisted XSS involving a source-mode paste.
CVE-2018-19278
PUBLISHED: 2018-11-14
Buffer overflow in DNS SRV and NAPTR lookups in Digium Asterisk 15.x before 15.6.2 and 16.x before 16.0.1 allows remote attackers to crash Asterisk via a specially crafted DNS SRV or NAPTR response, because a buffer size is supposed to match an expanded length but actually matches a compressed lengt...