Saturday, December 28, 2024
HomeAppleHacker Bypass iPhone Lockscreen to Access the Contact list by Exploit a...

Hacker Bypass iPhone Lockscreen to Access the Contact list by Exploit a Bug in iOS 13

Published on

SIEM as a Service

A security researcher discovered a flaw in iOS 13 that allows bypassing the iPhone lock screen and access the victims to contact information without unlocking the device.

Apple announced a release of iOS 13 during the company’s iPhone 11 event at its Cupertino, California, headquarters on Tuesday. Meanwhile, Jose Rodrigue, a Spanish security researcher discovered two security flaws (lock screen bypass ) in iOS 13 Beta which is available since June 2019.

He has successfully exploited the iPhone lock screen by activating the FaceTime call and enable access to the contact list with the help of Siri ‘s Voice over feature.

- Advertisement - SIEM as a Service

Rodriguez reported the vulnerabilities to Apple on July, 17, But still Apple working in the Gold Master (GM) version of iOS 13, which is scheduled to be released on September 19.

How to Bypass the iPhone Lock Screen to Access the Contact List?

In order to perform the hack, the attacker first needs to physically access the mobile and make a FaceTime call from another Iphone.

Once the targeted iPhone that running with iOS 13 receives the call, the attacker needs to click the option called “custom” and respond with the Text Message.

At this moment, an attacker needs to activate the VoiceOver feature by Interact with Siri to change the “To” field where the attacker can just tap on it and pulls up the contact list that saved in the vulnerable iPhone.

Through the filed, he can access the email addresses, phone numbers, address information and more contacts details.

Rodriguez demonstrates the video, in which he exploits the bug in iOS 13 to access the contacts, and the process is very simple to anyone who has basic skills about the iPhone.

The process of exploiting the bug is difficult since the attacker needs to access the device first, and also the targeted device supports Siri for enabling voice control.

The flaw expected to be fixed in 13.1 that more likey Apple released on September 30.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Lumma Stealer Attacking Users To Steal Login Credentials From Browsers

Researchers observed Lumma Stealer activity across multiple online samples, including PowerShell scripts and a...

New ‘OtterCookie’ Malware Attacking Software Developers Via Fake Job Offers

Palo Alto Networks reported the Contagious Interview campaign in November 2023, a financially motivated...

NjRat 2.3D Pro Edition Shared on GitHub: A Growing Cybersecurity Concern

The recent discovery of the NjRat 2.3D Professional Edition on GitHub has raised alarms...

Palo Alto Networks Vulnerability Puts Firewalls at Risk of DoS Attacks

A critical vulnerability, CVE-2024-3393, has been identified in the DNS Security feature of Palo...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Apple Safari JavaScriptCore Remote Code Execution Flaw Exploited in the Wild

A critical vulnerability identified as CVE-2024-44308 has been actively exploited in the wild, affecting...

Hackers Exploit iOS Settings to Trigger Fake iOS Updates on Hijacked Devices

A sophisticated mobile attack vector involves a deceptive iOS update that masquerades as the...

Apple Tightens macOS Gatekeeper Controls in macOS Sequoia

Apple has announced changes to its macOS Gatekeeper security feature with the release of...