Hackers successfully compromised data on iPhone X running iOS 12.1 to recover deleted photos, receive 1.2 billion VND

This group of hackers can not only access the data of the iPhone X but also recover the images on the previously deleted device.

Two hackers, Richard Zhu and Amat Cama, successfully demonstrated the hacked iPhone X running iOS 12.1 at the Pwn2Own hacking contest that took place in Tokyo.

This group of hackers can not only access the data of the iPhone X but also recover the images on the previously deleted device. Specifically, the iOS operating system on the iPhone X will issue a prompt 'This image will be deleted from the iCloud Photo of all devices' when the user deletes the photo. After confirmation, deleted photos will be moved to 'Recently deleted'. They will be permanently deleted if the user continues to delete or disappear after about 40 days.

Hackers successfully compromised data on iPhone X running iOS 12.1 to recover deleted photos, receive 1.2 billion VND Picture 1Hackers successfully compromised data on iPhone X running iOS 12.1 to recover deleted photos, receive 1.2 billion VND Picture 1

The two hackers took advantage of the flaw in the just-in-time (JIT) compiler to recover recently deleted images remotely. According to Forbes, in theory if a hacker can interfere with the compiler, he can access any recently deleted file.

Hackers successfully compromised data on iPhone X running iOS 12.1 to recover deleted photos, receive 1.2 billion VND Picture 2Hackers successfully compromised data on iPhone X running iOS 12.1 to recover deleted photos, receive 1.2 billion VND Picture 2

With the discovery of the security hole, the two hackers were awarded $ 50,000 (about 1.2 billion VND). After receiving a report of the bug, Apple said it will release iOS 12.1.1 patch in the near future.

See more:

  1. Just released iOS 12 has been successfully hacked by Chinese hackers on the iPhone Xs
  2. Apple ID accounts are used by Chinese hackers to steal money
  3. Good hackers find and patch the vulnerability for more than 100,000 other routers
5 ★ | 1 Vote