News

New security feature in iOS 11.4.1 "USB Restricted Mode" is easy to trick

                                                                                

Following the launch of iPhone hacking solutions such as Greyshift and Celebrite, Apple has promised to launch an iOS feature to prevent this type of attack on its devices. The capability of USB Restricted Mode has been in testing for a long time, but has just now become available in a final version of the operating system. Unfortunately, it suffers from a vulnerability, which is likely to be repaired in a new version of iOS 11, or just in autumn, with the release of iOS 12.

The USB Restricted Mode in iOS has coincided with version 11.4.1, which also solved the censorship problem for some users who closed applications when using the Taiwanese-style emoji. This could be the latest version of iOS 11, as in about two months Apple will launch iOS 12 alongside its new iPhone range

The feature can be enabled or disabled as desired in the "Touch ID / Face ID & Passcode" security menu and listed under "USB Accessories". By default, it works, and in order to turn it off, the button must be in the "on" position, marked in green. If the USB Accessories feature is disabled, after an hour when the phone was not used or unlocked with a password, fingerprint, or facial recognition, access to the Lightning port is restricted for data or accessory transfer. Only loading can be done in this way

When the button is in the "on" position, accessories connection and data transfer are possible at any time, whether or not the device is locked. The problem with this feature is, at the moment, rather serious. If an accessory is connected at any time within 60 minutes of the last unlocking, the stopwatch is reset. Also, if the accessory remains connected, the USB port remains unlocked. So if authorities or other people with access to GreyKey or Celebrite unlock devices put their hands on a device shortly after its last use, it's enough to plug an accessory to get Apple's protection. To test and demonstrate this vulnerability, ElcomSoft security researchers have used a $ 40 adapter called the Lightning to USB 3 Camera Adapter

Source link

Related Post