Home Security New iOS feature will hinder third-party passcode crackers

New iOS feature will hinder third-party passcode crackers

A new feature in iOS 11.4.1 beta will disable the Lightning port after an hour of the device in question being unlocked, as claimed by a researcher last month, with the only difference being how long it would take for this to happen. Version 11.4 was announced at Apple's Worldwide Developers Conference in California on Monday.

Oleg Afonin of the desktop and mobile forensic tools maker Elcomsoft wrote that though the feature had not surfaced in the 11.4 final build, it had appeared in the 11.4.1 beta.

He said USB Restricted Mode had been described as follows in the 11.3 beta: "To improve security, for a locked iOS device to communicate with USB accessories you must connect an accessory via lightning connector to the device while unlocked — or enter your device passcode while connected — at least once a week.”

Focus on the iPhone's security has grown after the FBI had a stoush with Apple in 2016 over gaining access to an iPhone used by a terrorist to kill people in San Bernardino, California.

The agency subsequently gained access to the devices through the services of a private firm known as Cellebrite. More recently, another company, GrayShift, has been reported to be selling devices to unlock the latest iPhones.

allow access

This feature seemed to be aimed at tools such as those made by Cellebrite and GrayShift that could crack passcodes, Afonin said.

He pointed out that among the options in the "allow access when locked" dialog, Afonin provided a screenshot (above) that showed one titled "USB Accessories".

iphone screen"Once the user toggles the 'USB Accessories' switch, the iPhone will require you to 'Unlock iPhone to use accessories' to connect (seen on the left) when it has been more than an hour since your iPhone was locked," he wrote.

The FBI has repeatedly claimed that it could not gain access to 7800 devices in 2017 to pursue investigations. That claim was found to be overblown.

Afonin said it was clear this was the “proper” USB Restricted Mode because, unlike before, there was zero data communicated over the USB port once the feature kicked in.

"iTunes does not see the device at all; no 'unlock this device to access' and no pairing request. The iPhone just charges off the computer’s USB port, transmitting no information.

"We have not been able to access even the basic information about the device using the Elcomsoft iOS Forensic Toolkit I(nfo) command, the very same command that returns identification information about an iOS device even if it has never been paired with the computer."

However, Afonin noted that there may be a possible workaround. "As was the case in iOS 11.3 beta, the clock starts ticking after the device is locked or after the device is disconnected from a trusted (paired) computer or USB accessory (we were able to positively verify the latter by running a simple test).

"In order to keep the USB port unlocked, the police would have to connect the iPhone to a trusted device during the first one hour, and keep it connected at all times before they have a chance to attempt acquisition."

Screenshots: courtesy Elcomsoft

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

RECOVERING FROM RANSOMWARE

Ransomware is a type of malware that blocks access to your files and systems until you pay a ransom.

The first example of ransomware happened on September 5, 2013, when Cryptolocker was unleashed.

It quickly affected many systems with hackers requiring users to pay money for the decryption keys.

Find out how one company used backup and cloud storage software to protect their company’s PCs and recovered all of their systems after a ransomware strike.

DOWNLOAD THE REPORT!

Sam Varghese

website statistics

A professional journalist with decades of experience, Sam for nine years used DOS and then Windows, which led him to start experimenting with GNU/Linux in 1998. Since then he has written widely about the use of both free and open source software, and the people behind the code. His personal blog is titled Irregular Expression.

 

Popular News

 

Telecommunications