Researchers Crack iPhone Password Protection

Researchers at the Fraunhofer Institute for Secure Information Technology (SIT) in Germany have found a way to steal passwords from Apple iPhones in six minutes.

The institute’s discovery could pose a security problem if phones are lost, as the attack requires physical access to the device. The researchers’ target was the “Keychain”, Apple’s password-management system. Rather than crack the 256-bit encryption to get to the passwords stored in the Keychain, the researchers explained in a paper (PDF), the institute exploited the fact that the underlying secret the password’s encryption is based on is stored in the device’s operating system.

Jail-breaking tool

This means the encryption is independent from the personal password that is supposed to protect access to the device, according to the researchers. As a result, the required key material can be created from data available within the device and therefore in possession of the attacker.

To launch the attack, the researchers used a jail-breaking tool and installed a SSH (Secure Shell) server on the device so that software could be run on the phone unrestricted. After that, the researchers ran a small script to access and decrypt the passwords found in the Keychain.

“The decryption is done with the help of functions provided by the operating system itself,” according to a paper on the situation. “Our script reveals the always unencrypted settings (e.g., user name, server, etc.) for all stored accounts.”

A video demonstration can be viewed here. In the current versions of iOS, the Keychain contains user accounts, including passwords such as email, groupware, VPN, Wi-Fi, websites and often also passwords and certificates used in third-party applications, the researchers wrote.

Works on any iOS device

According to the paper, the situation can be exploited on any device running iOS.

While many people think the smartphone encryption will provide sufficient security, this is a false assumption, the researchers said.

“This opinion we encountered even in companies’ security departments,” Jens Heider, technical manager of the Fraunhofer SIT security test lab, said in a statement. “Our demonstration proves that this is a false assumption. We were able to crack devices with high security settings within a very short time.”

Anyone whose phone is lost or stolen should immediately change their passwords as a precaution, the researchers recommended in the paper.

Brian Prince eWEEK USA 2014. Ziff Davis Enterprise Inc. All Rights Reserved

Recent Posts

X’s Community Notes Fails To Stem US Election Misinformation – Report

Hate speech non-profit that defeated Elon Musk's lawsuit, warns X's Community Notes is failing to…

1 day ago

Google Fined More Than World’s GDP By Russia

Good luck. Russia demands Google pay a fine worth more than the world's total GDP,…

1 day ago

Spotify, Paramount Sign Up To Use Google Cloud ARM Chips

Google Cloud signs up Spotify, Paramount Global as early customers of its first ARM-based cloud…

2 days ago

Meta Warns Of Accelerating AI Infrastructure Costs

Facebook parent Meta warns of 'significant acceleration' in expenditures on AI infrastructure as revenue, profits…

2 days ago

AI Helps Boost Microsoft Cloud Revenues By 33 Percent

Microsoft says Azure cloud revenues up 33 percent for September quarter as capital expenditures surge…

2 days ago