New Restricted Mode USB mode on iOS 11.4.1 appears a serious security vulnerability
Recently released iOS 11.4.1 with Restricted Mode security feature that allows data access on iPhone via Lightning port after the device has been unlocked for more than an hour. But according to a new discovery by a security company called ElcomSoft, this new security feature is not really as secure as we think.
Recently released iOS 11.4.1 with Restricted Mode security feature that allows data access on iPhone via Lightning port after the device has been unlocked for more than an hour. But according to a new discovery by a security company called ElcomSoft, this new security feature is not really as secure as we think.
Accordingly, the company has discovered a serious security vulnerability on this new feature. Specifically, the last 60-minute countdown timer from the iPhone unlock will reset from the beginning if within a 1-hour period a USB port accessory is plugged into the device. There are many accessories, including first-party accessories made by Apple, that can do this.
In addition, the history connected to the newly plugged accessory is also ignored by the iPhone. During the test, the researchers found that the hacking technique overtook the iPhone even when using an adapter that converted the camera's Lightning to USB 3 port. However, the Lightning converter cable to 3.5mm audio port does not work. Currently, they are continuing to experiment with more adapters.
According to expert Oleg Afonin, in case the law enforcement agency confiscates the device at the time the new owner unlocks, they can immediately connect the phone to a compatible USB accessory to prevent Restricted Mode USB activation. And they will have 60 minutes to access iPhone via Lightning port since that time to hack the passcode to unlock the device.
The expert also added that Apple will soon discover an error that can delay Restricted Mode with a simple manual method and fix it immediately. 'Apples' introduce their new security features to help protect users' private information to the highest level so they won't be able to survive such a primitive vulnerability. Before iOS 12 launched, Apple had plenty of time to research and refine its security features.
Currently, Apple still has no response to this incident.
See more:
- The $ 5 million supercar is capable of hacking iPhone and Android smartphones from a distance of 500 meters
- The former Apple engineer claims to be able to unlock all iPhones for $ 15,000
- Apple denies that iPhone can be brute force to open passwords easily
You should read it
- On iOS 11.4, iPhone without unlocking for 1 week will be blocked USB connection
- How to enable Restricted Mode USB on iPhone
- How to turn off the 'Unlock iPhone to Use Accessories' warning on iPhone, iPad
- Apple denies that iPhone can be brute force to open passwords easily
- iPhone is stuck with a dangerous security error
- Apple confirms the existence of a series of serious vulnerabilities that can cause iPhones to be hacked
- 'XP mode' in Windows 7 can be compromised by security
- The security 'standalone' for iPhone. How many methods do you know?
- High security but iPhone can still be hacked when accessing malicious websites
- Security experts found a way to break iPhone passwords on all versions without worrying about locking or deleting data
- 4 data security applications on iPhone that you should have
- Protect iPhone, iPad before iCloud security hole
Maybe you are interested
How are Intel's U, P and H chips different? How to hide your Telegram account profile picture Plot Resident Evil 3 Remake: Biography of the characters in the game Treachery in Beatdown City review, a little reminiscent of the old days School districts reportedly ban Zoom over security issues President of Hanoi recommends that people should limit the road from now until March 31