NEWS
Apple Pushes Back on Hacker's iPhone Passcode Bypass Report [Update: False Alarm]
2709
2018-06-25
Posted by 3uTools

Apple Pushes Back on Hacker's iPhone Passcode Bypass Report [Update: False Alarm]


A security researcher's demonstration that purportedly bypassed a passcode on up-to-date iPhones and iPads has been pushed back by Apple.


Matthew Hickey, a security researcher and co-founder of cybersecurity firm Hacker House, tweeted Friday about a potential way to bypass security limits, allowing him to enter as many passcodes as he wants -- even on the latest version of iOS 11.3.


Beyond ten wrong passcodes, the device can be set to erase its contents.


Hickey said he found a way around that. He explained that when an iPhone or iPad is plugged in and a would-be-hacker sends keyboard inputs, it triggers an interrupt request, which takes priority over anything else on the device.


"Instead of sending passcode one at a time and waiting, send them all in one go," he said.


"If you send your brute-force attack in one long string of inputs, it'll process all of them, and bypass the erase data feature," he explained.


Despite several requests for comment, Apple spokesperson Michele Wyman said Saturday: "The recent report about a passcode bypass on iPhone was in error, and a result of incorrect testing."


Apple did not say why it disputed Hickey's findings, which he reported to the company Friday, before tweeting.


We reported Friday on Hickey's findings, which claimed to be able to send all combinations of a user's possible passcode in one go, by enumerating each code from 0000 to 9999, and concatenating the results in one string with no spaces. He explained that because this doesn't give the software any breaks, the keyboard input routine takes priority over the device's data-erasing feature.


But Hickey tweeted later, saying that not all tested passcodes are sent to a the device's secure enclave, which protects the device from brute-force attacks.


"The [passcodes] don't always go to the [secure enclave processor] in some instances -- due to pocket dialing [or] overly fast inputs -- so although it 'looks' like pins are being tested they aren't always sent and so they don't count, the devices register less counts than visible," he tweeted.


Hickey credited Stefan Esser for his help.


"I went back to double check all code and testing," said Hickey in a message Saturday. "When I sent codes to the phone, it appears that 20 or more are entered but in reality its only ever sending four or five pins to be checked."


Apple is rolling out a new feature, called USB Restricted Mode, in its upcoming iOS 12 update, which is said to make it far more difficult for police or hackers to get access to a person's device -- and their data.


Update: Apple provided the following statement to Rene Ritchie:


The recent report about a passcode bypass on iPhone was in error, and a result of incorrect testing.


Source: zdnet

Related Articles
Alibaba Pandora Lab Jailbreaks iOS 11.2 Successfully Apple Still Signing iOS 11.3 Beta 5/6, Downgrade to It to Jailbreak Your iPhone iCloud Bypass Bug Discovered in iOS 11 Qihoo 360 Vulcan Team has Achieved iOS 11.3 Jailbreak iOS 11.2.2 Jailbreak With Electra Might Be Possible, Here’s What You Need To Know iOS 11.1.2 Exploit async_wake ipa is Released How to Jailbreak iOS 11– iOS 11.4.1 Using Electra Jailbreak on iPhone or iPad Demo for Jailbreak iOS 11.3.1 by @S0rryMybad