iPhone Lockscreen Exploit Discovered In Apple's iOS 12.1

Author - Nov 04, 2018


iPhone Lockscreen Exploit Discovered In Apple's iOS 12.1

Just hours after Apple releasing iOS 12.1, a Spanish security researcher discovered that there is a bug allowing people to get iPhone users' contact information.

On Tuesday, just hours after Apple rolled out iOS 12.1, a security researcher discoverered a bug allowing people to exploit Facetime group calls. This bug gives hackers access to all contact information of iPhone users on their iPhone without a passcode.
Jose Rodriguez was the first person to discover the bug and he also was the first person to inform the Hacker News about it. Then, he has uploaded a clip on YouTube to demonstrate how the password bug works and Gizmodo - a popular tech site has confirmed that the conditions outlined by him are legitimate.

They would have to manually access the phone they are currently targeting and has several options of viewing the user’s contact information. They can either call the targeted phone from another iPhone or make a call with that phone. When the call connects, they would:
- Select the Facetime app
- Tap “Add a person”
- Choose the “plus” icon
- Scroll through all the contacts and view alll contact information stored by using 3D touch on a name.

You can make the iPhone call itself without knowing the passcode by either asking Siri to call a number or just simply saying “call my phone” if they do not know the phone number. Gizmodo tested both methods with the owner and also stranger's voices, and Siri processed the request with no problem.

By no mean, this security flaw isn’t critical and any hacker would have to clear some hurdles before making uses of those information. Still, it would pose some risks for political dissidents or domestic abuse victims.

However, a truly hacker could use phone number and email from a user’s network to cause a complicated hacking campaign using techniques like phishing.

Now, Apple still has not commented on this issue. In previous versions of ios, we’ve seen very similar methods to bypass iOS’s secured lock screen and there is not a lot that no one can do anything till Apple adds a fix in the updates in future. Until then, iPhone users could deactivate Siri to protect themselves but it cannot tackle the core problem.

Comments

Sort by Newest | Popular