Friday, March 14, 2025
HomeSecurity NewsNow Law Enforcement Agencies Can Possibly Breakthrough into any iPhone Model up...

Now Law Enforcement Agencies Can Possibly Breakthrough into any iPhone Model up to iOS 11

Published on

SIEM as a Service

Follow Us on Google News

It appears that law enforcement agencies can breakthrough into any iPhone Model up to iOS 11 as the Israel firm Cellebrite claimed that it’s engineer’s have the ability to unlock any iPhone including the most recent iPhone X.

Time to remember the famous case where the FBI asked Apple for help to unlock the shooter’s iPhone, which was locked and encrypted. But Apple refused to help unlock the phone, arguing the device’s encryption could not be defeated.

Cellebrite the Israel-based firm who remains the company of choice for U.S. government to unlock the mobile phones for forensic analysis.

The firm hasn’t made any public announcement about its ability in breaking the Apple iOS devices and operating systems, including iPhone, iPad, iPad mini, iPad Pro and iPod touch, running iOS 5 to iOS 11.

An anonymous source told Forbes that Cellebrite could unlock the iPhone 8. He also believed the same was most probably true for the iPhone X, as security across both of Apple’s newest devices worked in much the same way.

In its labs, the company then uses whatever secret exploits it has to crack the lock and either hand it back to investigators so they can take data from the device, or Cellebrite can do that for them. As Forbes previously detailed, this can be relatively inexpensive, costing as little as $1,500 per unlock.

The ability to break down any iPhone gives a significant moment to law enforcement agencies around the world. iPhone consists of some significant vulnerabilities, a Women in China was able to unlock iPhone X through her friend facial recognition ID without using any 3D print hardware and face mask.

Also, the text bomb attack that a Single Text Character Can Crash any Apple iPhone, Mac or iPad which made a big news last week.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

New Microsoft 365 Attack Leverages OAuth Redirection for Credential Theft

Threat researchers at Proofpoint are currently tracking two sophisticated and highly targeted cyber-attack campaigns...

Decrypting Akira Ransomware on Linux/ESXi Without Paying Hackers

A team successfully decrypted an instance of the Akira ransomware on Linux/ESXi systems without...

New Cyber Attack Targets PyPI Users to Steal Cloud Tokens and Sensitive Data

A recent discovery by ReversingLabs researchers has unveiled a malicious cyber attack targeting the...

Blind Eagle Targets Organizations with Weaponized .URL Files to Steal User Hashes

APT-C-36, more commonly known as Blind Eagle, has intensified its operations targeting Colombian governmental,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

49,000+ Access Management Systems Worldwide Exposed to Major Security Gaps

A recent study conducted by Dutch IT security consultancy Modat has revealed alarming vulnerabilities...

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most...

Check Point Software to Open First Asia-Pacific R&D Centre in Bengaluru, India

Check Point Software Technologies Ltd. has announced plans to establish its inaugural Asia-Pacific Research...