Apple’s backup protection in its latest iOS update has been called into question by a well-known Russian forensics company.
The company, Elcomsoft, revealed in a blog posting that it had uncovered “a major security flaw in the iOS10 backup protection mechanism.”
“The impact of this security weakness is severe. An early CPU-only implementation of this attack gives a 40-times performance boost compared to a fully optimized GPU-assisted attack on iOS 9 backups.”
Elcomsoft is known to sell its phone breaking software to all parties, not just law enforcement officials. Indeed, some beleive its software was involved with the infamous “Celebgate” hack in 2014, which saw nude photos of the likes of Jennifer Lawrence exposed.
Elcomsoft said that when it was developing an update to its Phone Breaker software, it noticed an alternative password verification mechanism had been added to iOS 10 backups.
Unfortunately, it seems that Apple had decided to forgo certain security checks, which if an attacker managed to get one of those backup files without the associated password, it allowed the researchers to try passwords approximately 2,500 times faster compared to the old mechanism used in iOS 9 and older.
“This new vector of attack is specific to password-protected local backups produced by iOS 10 devices,” the researchers said. “The attack itself is only available for iOS 10 backups.”
The firm said that even without GPU acceleration the new method works 40 times faster compared to the old method with GPU acceleration.
The researcher admitted that Apple iPhones are secure and each iOS release makes it tougher to crack, so that leaves the iTunes backup as the one remaining point of vulnerability.
Apple confirmed it was looking into the issue and said it only affected backups on iTunes.
“We’re aware of an issue that affects the encryption strength for backups of devices on iOS 10 when backing up to iTunes on the Mac or PC,” it said in a statement to Forbes.
“We are addressing this issue in an upcoming security update. This does not affect iCloud backups,” a spokesperson said. “We recommend users ensure their Mac or PC are protected with strong passwords and can only be accessed by authorised users. Additional security is also available with FileVault whole disk encryption.”
Other methods have been used to hack iPhones in various ways in the past, including cloning fingerprints to trick the Touch ID scanner with Play-Doh.
And earlier this year, iPhone malware has discovered after human right activist Ahmed Mansoor in the United Arab Emirates (UAE), was targeted by sophisticated spyware for the iPhone.
That exploit code, dubbed Trident, could have turned the iPhone of a human rights activist into a spyware device with just one click.
Apple meanwhile has already released 10.0.2. to address a headphone flaw. The update includes fixes for when Lightning headphones momentarily lose playback controls.
Suspended prison sentence for Craig Wright for “flagrant breach” of court order, after his false…
Cash-strapped south American country agrees to sell or discontinue its national Bitcoin wallet after signing…
Google's change will allow advertisers to track customers' digital “fingerprints”, but UK data protection watchdog…
Welcome to Silicon In Focus Podcast: Tech in 2025! Join Steven Webb, UK Chief Technology…
European Commission publishes preliminary instructions to Apple on how to open up iOS to rivals,…
San Francisco jury finds Nima Momeni guilty of second-degree murder of Cash App founder Bob…