Wednesday, February 26, 2025
HomeAppleHacker Successfully Jailbreak the Current Version of iOS 12.4 - Millions of...

Hacker Successfully Jailbreak the Current Version of iOS 12.4 – Millions of iphone Users are Vulnerable to Hack

Published on

SIEM as a Service

Follow Us on Google News

Security researcher successfully Jailbreak the latest version of iOS 12.4 by taking advantage of the unpatched vulnerability that has been already fixed by Apple, and the Jailbreak creates an easy way to hack any vulnerable iPhone and iPad.

Apple accidentally unpatched the vulnerability that has already patched in last Apple security update released in July and the bug was reported by a Google security expert.

Pwn20wnd (Twitter name), a security researcher who has publicly released a free jailbreak code on Github for a currently up-to-date version of iPhone 12.4.

This unpatched vulnerability not only allows to Jailbreak iOS 12.4 but it also making current versions of iOS vulnerable to hackers, and exploit the device.

Jailbreak the iPhone let you unlocking a device to install whatever you want on it which allows hackers and exploit brokers can sell it for millions of dollars but the researcher now publicly release jailbreak code on GitHub will notify to Apple to quickly patch the vulnerability.

This Apple’s accident role back for the fixed vulnerability let hackers easily exploit the vulnerability in all devices of this version (or any 11.x and 12.x below 12.3) are jail breakable, and the exploit is already available in online.

https://twitter.com/yosy1692/status/1163358975427010560

According to thePwn20wnd, a researcher who created the Jailbreak told Motherboard that “somebody could make a perfect spyware” taking advantage of Apple’s mistake.

“A malicious app could include an exploit for this bug that allows it to escape the usual iOS sandbox—a mechanism that prevents apps from reaching data of other apps or the system—and steal user data.”

Using the Pwn20wnd jailbreak, many of the users are posting a story on Twitter that they have successfully Jailbreak iOS 12.4.

Williamson, a Google security researcher confirmed that the old exploit that was once patched by Apple works on his iPhone XR.

This critical bug in iOS 12.4 that accidentally rollback by Apple let malicious hackers perform various attacks such as infecting device with malware and other sophisticated attacks.

Below video explains you about how to Jailbreak the iOS 12.4 using the Pwn20’s exploit.

This Critical security flaw could allow hackers to take over almost any Iphone or Ipad.

iPhone security experts are warning for that, the user should be careful what apps they download.

There is no other option except let Apple released an emergency update for the next couple of days till 12.4.1 comes out.

Sponsored:  – Manage all the Endpoint networks from a single Console.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Google Issues Warning on Phishing Campaigns Targeting Higher Education Institutions

Google, in collaboration with its Mandiant Threat Intelligence team, has issued a warning about...

TgToxic Android Malware Updated it’s Features to Steal Login Credentials

The TgToxic Android malware, initially discovered in July 2022, has undergone significant updates, enhancing...

Hackers Exploiting Cisco Small Business Routers RCE Vulnerability Deploying Webshell

A critical remote code execution (RCE) vulnerability, CVE-2023-20118, affecting Cisco Small Business Routers, has...

Malicious npm Package Targets Developers for Supply Chain Attack

The Socket Research Team has uncovered a malicious npm package@ton-wallet/create designed to steal sensitive...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Apple Removes Advanced Data Protection (ADP) for UK Users

Apple has discontinued its Advanced Data Protection (ADP) feature for UK users following a...

CISA Warns of Active Exploitation of Apple iOS & iPadOS Vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent advisory warning of...

Breaking macOS Apple Silicon Kernel Hardening: KASLR Exploited

Security researchers from Korea University have successfully demonstrated a groundbreaking attack, dubbed SysBumps, which...