An iPhone Prototype is interfered with specialized equipment.Photo: Motherboard.
Meanwhile, the prototype iPhone still has a 'port' to interfere inside because the SEP system is not completely encrypted. Therefore, depending on the level of SEP encryption, hackers can extract iOS source code and hardware information.
Hackers can sell data collected to the black market, police, who develop iPhone unlocking tools or even genuine Apple to get bonuses. The black market is the favorite place for hackers because it sells for a higher price. In 2016, a hacker discovered a security vulnerability on iOS but later rejected a bonus of up to hundreds of thousands of dollars from Apple.
The original iPhone X is for sale online.
Hackers can buy prototype iPhones from collectors, on the black market because of being leaked from the factory.
According to an anonymous security expert, an iPhone X Prototype model can be sold for about $ 1,800 (more than 42 million), and if you want to own a prototype iPhone XR, you can extract software information as well. and hardware hackers will have to spend up to 20,000 USD.
On the other hand, iPhone Prototypes have helped create the iPhone unlocking tool being used in law enforcement agencies. The most prominent is the FBI case that broke a terrorist's iPhone 5C in San Bernadino in 2016 thanks to Cellebrite's unlocking tool.
To ensure the original iPhones don't reveal too many secrets, Apple has established its own mechanism with many different layers of protection, even engineers in the same development team can't know the whole thing. In addition, Cupertino (USA) has strict rules and gives very heavy penalties, even dismissing employees who reveal secrets.
recently, zdnet has reported on a white hat hacker claiming to be alexey, specializing in finding vulnerabilities in mikrotik router system and patching up so that bad guys can't use them to do bad things.
while intel's meltdown and specter vulnerabilities have not been completely overcome, the world faces a new security vulnerability that allows hackers to take complete control of the user's device and attack time within 30 seconds.
many companies now implement bug bounty programs to encourage the community to find security vulnerabilities in software and privately report them to developers before hackers exploit them.
google 's project zero security team discovered two new security vulnerabilities of the zero-day vulnerability called cve-2019-7286 and cve-2019-7287 on ios that allow hackers to exploit to take advantage of it. user.
while ransomware wannacry has stirred up the internet world over the past few weeks to exploit only two vulnerabilities, the new malware uses seven vulnerabilities.
microsoft recently issued an emergency warning about an online spam campaign targeting european countries, currently using an exploit can easily infect users by simply opening an attachment. .
nsa, cisa and fbi have just released a list of vulnerabilities most exploited by chinese hackers to target government and critical infrastructure networks.