NEWS

Apple Pushes Back on Hacker's iPhone Passcode Bypass Report [Update: False Alarm]

06/25/2018

3635

Apple Pushes Back on Hacker's iPhone Passcode Bypass Report [Update: False Alarm]


A security researcher's demonstration that purportedly bypassed a passcode on up-to-date iPhones and iPads has been pushed back by Apple.


Matthew Hickey, a security researcher and co-founder of cybersecurity firm Hacker House, tweeted Friday about a potential way to bypass security limits, allowing him to enter as many passcodes as he wants -- even on the latest version of iOS 11.3.


Beyond ten wrong passcodes, the device can be set to erase its contents.


Hickey said he found a way around that. He explained that when an iPhone or iPad is plugged in and a would-be-hacker sends keyboard inputs, it triggers an interrupt request, which takes priority over anything else on the device.


"Instead of sending passcode one at a time and waiting, send them all in one go," he said.


"If you send your brute-force attack in one long string of inputs, it'll process all of them, and bypass the erase data feature," he explained.


Despite several requests for comment, Apple spokesperson Michele Wyman said Saturday: "The recent report about a passcode bypass on iPhone was in error, and a result of incorrect testing."


Apple did not say why it disputed Hickey's findings, which he reported to the company Friday, before tweeting.


We reported Friday on Hickey's findings, which claimed to be able to send all combinations of a user's possible passcode in one go, by enumerating each code from 0000 to 9999, and concatenating the results in one string with no spaces. He explained that because this doesn't give the software any breaks, the keyboard input routine takes priority over the device's data-erasing feature.


But Hickey tweeted later, saying that not all tested passcodes are sent to a the device's secure enclave, which protects the device from brute-force attacks.


"The [passcodes] don't always go to the [secure enclave processor] in some instances -- due to pocket dialing [or] overly fast inputs -- so although it 'looks' like pins are being tested they aren't always sent and so they don't count, the devices register less counts than visible," he tweeted.


Hickey credited Stefan Esser for his help.


"I went back to double check all code and testing," said Hickey in a message Saturday. "When I sent codes to the phone, it appears that 20 or more are entered but in reality its only ever sending four or five pins to be checked."


Apple is rolling out a new feature, called USB Restricted Mode, in its upcoming iOS 12 update, which is said to make it far more difficult for police or hackers to get access to a person's device -- and their data.


Update: Apple provided the following statement to Rene Ritchie:


The recent report about a passcode bypass on iPhone was in error, and a result of incorrect testing.


Source: zdnet

Windows
Mac OS
iOS
Linux
3uTools
Win 64-bit For this device
V9.0 2025-11-11
Download
Win 32-bit For this device
V9.0 2025-11-11
Download
3uTools V3.18
2025-09-18
Please use the 3uTools PC client to install the iOS client:
1、 Install either the Windows or Mac version of 3uTools on your computer
2、 Open the PC client and connect your device to the computer via USB cable
3、 After the connection is successful, wait for the computer to automatically install the mobile app for the device, or locate “Install Mobile App” on the computer and manually click to install.
3uTools
deb file
v3.01 2025-11-20
Download
rpm file
v3.01 2025-11-20
Download
Windows
iOS
Android
3uAirPlayer
Win 64-bit For this device
V6.0.2 2025-11-19
Download
Win 32-bit For this device
V6.0.2 2025-11-19
Download
iOS Device Mirroring (No App Required)
1、 Install 3uAirPlayer on the Windows PC
2、 Open Control Center and select Screen Mirroring
3、 From the list, choose your PC to start mirroring
4、 Or connect your iOS device to the PC via USB to begin mirroring
Scan to get "3uAirPlayer" App