Thursday, February 6, 2025
HomeSecurity NewsNow Law Enforcement Agencies Can Possibly Breakthrough into any iPhone Model up...

Now Law Enforcement Agencies Can Possibly Breakthrough into any iPhone Model up to iOS 11

Published on

SIEM as a Service

Follow Us on Google News

It appears that law enforcement agencies can breakthrough into any iPhone Model up to iOS 11 as the Israel firm Cellebrite claimed that it’s engineer’s have the ability to unlock any iPhone including the most recent iPhone X.

Time to remember the famous case where the FBI asked Apple for help to unlock the shooter’s iPhone, which was locked and encrypted. But Apple refused to help unlock the phone, arguing the device’s encryption could not be defeated.

Cellebrite the Israel-based firm who remains the company of choice for U.S. government to unlock the mobile phones for forensic analysis.

The firm hasn’t made any public announcement about its ability in breaking the Apple iOS devices and operating systems, including iPhone, iPad, iPad mini, iPad Pro and iPod touch, running iOS 5 to iOS 11.

An anonymous source told Forbes that Cellebrite could unlock the iPhone 8. He also believed the same was most probably true for the iPhone X, as security across both of Apple’s newest devices worked in much the same way.

In its labs, the company then uses whatever secret exploits it has to crack the lock and either hand it back to investigators so they can take data from the device, or Cellebrite can do that for them. As Forbes previously detailed, this can be relatively inexpensive, costing as little as $1,500 per unlock.

The ability to break down any iPhone gives a significant moment to law enforcement agencies around the world. iPhone consists of some significant vulnerabilities, a Women in China was able to unlock iPhone X through her friend facial recognition ID without using any 3D print hardware and face mask.

Also, the text bomb attack that a Single Text Character Can Crash any Apple iPhone, Mac or iPad which made a big news last week.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hackers Exploit 3,000 ASP.NET Machine Keys to Hack IIS Web Servers Remotely

Microsoft has raised alarms about a new cyber threat involving ViewState code injection attacks...

Abyss Locker Ransomware Attacking Critical Network Devices including ESXi servers

The Abyss Locker ransomware, a relatively new but highly disruptive cyber threat, has been...

Weaponized SVG Files With Google Drive Links Attacking Gmail, Outlook & Dropbox Users

A new wave of phishing attacks is leveraging Scalable Vector Graphics (SVG) files to...

Flesh Stealer Malware Attacking Chrome, Firefox, and Edge Users to Steal Passwords

A newly identified malware, Flesh Stealer, is rapidly emerging as a significant cybersecurity threat...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

New FUD Malware Targets MacOS, Evading Antivirus and Security Tools

A new strain of Fully Undetectable (FUD) macOS malware, dubbed "Tiny FUD," has emerged,...

Google Blocks 2.28 Million Malicious Apps from Play Store in Security Crackdown

In a continued commitment to enhancing user safety and trust, Google has outlined significant...

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...