Researchers at British Security Company MDsec have developed a tool that lets a hacker perform a “Brute Force” attack on a person’s protected iPhone passcode. The passcode cracking device tests different passcode combinations sequentially from 0000 to 9999, and hardwires through USB to the victim’s iPhone. The device also has a light which turns on once the device has been unlocked.
The researchers at MDsec claim that their tool can even work on Apple’s mobile devices if the owner of the mobile device has the ‘erase information after ten invalid passcode attempts’ option turned on, by cutting off the power supply of the iOS device. It is believed that MDsec’s device is exploiting a known Apple vulnerability, CVE-2014-4451 which was discovered last year and has since been patched.
The best practice for securing an iPhone is to use more than the standard, 4 digit passcode, and implement a new code that utilizes a complex string of characters, with numbers, letters, and special characters. It is also key to make sure that all devices are running the most up-to-date software with latest patches installed to correct any vulnerabilities.
For more information regarding this iPhone Passcode breach, please contact one of the following GraVoc employees:
Nate Gravel – Director of the Information Security Practice email@example.com
We’re thrilled to announce our new cybersecurity partnership with Gray, Gray & Gray, a leading independent accounting & consulting firm located in Canton, MA!
In this blog & video, we explore data compliance in cybersecurity & why it’s important for businesses to develop their own compliance program.
GraVoc’s Nate Gravel and Mike Kannan will be presenting at this year’s BankWorld on the importance of adversary simulation exercises.