Saturday, December 2, 2023

Hacker Bypass iPhone Lockscreen to Access the Contact list by Exploit a Bug in iOS 13

A security researcher discovered a flaw in iOS 13 that allows bypassing the iPhone lock screen and access the victims to contact information without unlocking the device.

Apple announced a release of iOS 13 during the company’s iPhone 11 event at its Cupertino, California, headquarters on Tuesday. Meanwhile, Jose Rodrigue, a Spanish security researcher discovered two security flaws (lock screen bypass ) in iOS 13 Beta which is available since June 2019.

He has successfully exploited the iPhone lock screen by activating the FaceTime call and enable access to the contact list with the help of Siri ‘s Voice over feature.

Rodriguez reported the vulnerabilities to Apple on July, 17, But still Apple working in the Gold Master (GM) version of iOS 13, which is scheduled to be released on September 19.

How to Bypass the iPhone Lock Screen to Access the Contact List?

In order to perform the hack, the attacker first needs to physically access the mobile and make a FaceTime call from another Iphone.

Once the targeted iPhone that running with iOS 13 receives the call, the attacker needs to click the option called “custom” and respond with the Text Message.

At this moment, an attacker needs to activate the VoiceOver feature by Interact with Siri to change the “To” field where the attacker can just tap on it and pulls up the contact list that saved in the vulnerable iPhone.

Through the filed, he can access the email addresses, phone numbers, address information and more contacts details.

Rodriguez demonstrates the video, in which he exploits the bug in iOS 13 to access the contacts, and the process is very simple to anyone who has basic skills about the iPhone.

The process of exploiting the bug is difficult since the attacker needs to access the device first, and also the targeted device supports Siri for enabling voice control.

The flaw expected to be fixed in 13.1 that more likey Apple released on September 30.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.


Latest articles

Cactus Ransomware Exploiting Qlik Sense code execution Vulnerability

A new Cactus Ransomware was exploited in the code execution vulnerability to Qlik Sense...

Hackers Bypass Antivirus with ScrubCrypt Tool to Install RedLine Malware

The ScrubCrypt obfuscation tool has been discovered to be utilized in attacks to disseminate the RedLine Stealer...

Hotel’s Hacked Logins Let Attacker Steal Guest Credit Cards

According to a recent report by Secureworks, a well-planned and advanced phishing attack was...

Critical Zoom Vulnerability Let Attackers Take Over Meetings

Zoom, the most widely used video conferencing platform has been discovered with a critical...

Hackers Using Weaponized Invoice to Deliver LUMMA Malware

Hackers use weaponized invoices to exploit trust in financial transactions, embedding malware or malicious...

US-Seized Crypto Currency Mixer Used by North Korean Lazarus Hackers

The U.S. Treasury Department sanctioned the famous cryptocurrency mixer Sinbad after it was claimed...

CISA Warns Hackers Exploiting Wastewater Systems Logic Controllers

In a disconcerting turn of events, cyber threat actors have set their sights on...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

API Attack Simulation Webinar

Live API Attack Simulation

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked.The session will cover:an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

Related Articles