Friday, November 1, 2024
HomeAppleHacker Successfully Jailbreak the Current Version of iOS 12.4 - Millions of...

Hacker Successfully Jailbreak the Current Version of iOS 12.4 – Millions of iphone Users are Vulnerable to Hack

Published on

Malware protection

Security researcher successfully Jailbreak the latest version of iOS 12.4 by taking advantage of the unpatched vulnerability that has been already fixed by Apple, and the Jailbreak creates an easy way to hack any vulnerable iPhone and iPad.

Apple accidentally unpatched the vulnerability that has already patched in last Apple security update released in July and the bug was reported by a Google security expert.

Pwn20wnd (Twitter name), a security researcher who has publicly released a free jailbreak code on Github for a currently up-to-date version of iPhone 12.4.

- Advertisement - SIEM as a Service

This unpatched vulnerability not only allows to Jailbreak iOS 12.4 but it also making current versions of iOS vulnerable to hackers, and exploit the device.

Jailbreak the iPhone let you unlocking a device to install whatever you want on it which allows hackers and exploit brokers can sell it for millions of dollars but the researcher now publicly release jailbreak code on GitHub will notify to Apple to quickly patch the vulnerability.

This Apple’s accident role back for the fixed vulnerability let hackers easily exploit the vulnerability in all devices of this version (or any 11.x and 12.x below 12.3) are jail breakable, and the exploit is already available in online.

https://twitter.com/yosy1692/status/1163358975427010560

According to thePwn20wnd, a researcher who created the Jailbreak told Motherboard that “somebody could make a perfect spyware” taking advantage of Apple’s mistake.

“A malicious app could include an exploit for this bug that allows it to escape the usual iOS sandbox—a mechanism that prevents apps from reaching data of other apps or the system—and steal user data.”

Using the Pwn20wnd jailbreak, many of the users are posting a story on Twitter that they have successfully Jailbreak iOS 12.4.

Williamson, a Google security researcher confirmed that the old exploit that was once patched by Apple works on his iPhone XR.

This critical bug in iOS 12.4 that accidentally rollback by Apple let malicious hackers perform various attacks such as infecting device with malware and other sophisticated attacks.

Below video explains you about how to Jailbreak the iOS 12.4 using the Pwn20’s exploit.

This Critical security flaw could allow hackers to take over almost any Iphone or Ipad.

iPhone security experts are warning for that, the user should be careful what apps they download.

There is no other option except let Apple released an emergency update for the next couple of days till 12.4.1 comes out.

Sponsored:  – Manage all the Endpoint networks from a single Console.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

LightSpy iOS Malware Enhanced with 28 New Destructive Plugins

The LightSpy threat actor exploited publicly available vulnerabilities and jailbreak kits to compromise iOS...

ATPC Cyber Forum to Focus on Next Generation Cybersecurity and Artificial Intelligence Issues

White House National Cyber Director, CEOs, Key Financial Services Companies, Congressional and Executive Branch...

New PySilon RAT Abusing Discord Platform to Maintain Persistence

Cybersecurity experts have identified a new Remote Access Trojan (RAT) named PySilon. This Trojan...

Konni APT Hackers Attacking Organizations with New Spear-Phishing Tactics

The notorious Konni Advanced Persistent Threat (APT) group has intensified its cyber assault on...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Hackers Exploit iOS Settings to Trigger Fake iOS Updates on Hijacked Devices

A sophisticated mobile attack vector involves a deceptive iOS update that masquerades as the...

Apple Tightens macOS Gatekeeper Controls in macOS Sequoia

Apple has announced changes to its macOS Gatekeeper security feature with the release of...

Critical OpenSSH “regreSSHion” Vulnerability Impacted macOS  Systems, Patch Now

A serious flaw in OpenSSH servers, dubbed "regreSSHion," affects macOS systems and could allow...