Researchers Crack iPhone Password Protection

Researchers at the Fraunhofer Institute for Secure Information Technology (SIT) in Germany have found a way to steal passwords from Apple iPhones in six minutes.

The institute’s discovery could pose a security problem if phones are lost, as the attack requires physical access to the device. The researchers’ target was the “Keychain”, Apple’s password-management system. Rather than crack the 256-bit encryption to get to the passwords stored in the Keychain, the researchers explained in a paper (PDF), the institute exploited the fact that the underlying secret the password’s encryption is based on is stored in the device’s operating system.

Jail-breaking tool

This means the encryption is independent from the personal password that is supposed to protect access to the device, according to the researchers. As a result, the required key material can be created from data available within the device and therefore in possession of the attacker.

To launch the attack, the researchers used a jail-breaking tool and installed a SSH (Secure Shell) server on the device so that software could be run on the phone unrestricted. After that, the researchers ran a small script to access and decrypt the passwords found in the Keychain.

“The decryption is done with the help of functions provided by the operating system itself,” according to a paper on the situation. “Our script reveals the always unencrypted settings (e.g., user name, server, etc.) for all stored accounts.”

A video demonstration can be viewed here. In the current versions of iOS, the Keychain contains user accounts, including passwords such as email, groupware, VPN, Wi-Fi, websites and often also passwords and certificates used in third-party applications, the researchers wrote.

Works on any iOS device

According to the paper, the situation can be exploited on any device running iOS.

While many people think the smartphone encryption will provide sufficient security, this is a false assumption, the researchers said.

“This opinion we encountered even in companies’ security departments,” Jens Heider, technical manager of the Fraunhofer SIT security test lab, said in a statement. “Our demonstration proves that this is a false assumption. We were able to crack devices with high security settings within a very short time.”

Anyone whose phone is lost or stolen should immediately change their passwords as a precaution, the researchers recommended in the paper.

Brian Prince eWEEK USA 2014. Ziff Davis Enterprise Inc. All Rights Reserved

Recent Posts

Apple, Google Mobile Ecosystems Should Be Investigated, CMA Told

CMA receives 'provisional recommendation' from independent inquiry that Apple,Google mobile ecosystem needs investigation

1 day ago

Australia Rejects Elon Musk Claim About Social Media Ban For Under-16s

Government minister flatly rejects Elon Musk's “unsurprising” allegation that Australian government seeks control of Internet…

1 day ago

Northvolt Files For Bankruptcy Protection In US

Northvolt files for Chapter 11 bankruptcy protection in the United States, and CEO and co-founder…

1 day ago

UK’s CMA Readies Cloud Sector “Behavioural” Remedies – Report

Targetting AWS, Microsoft? British competition regulator soon to announce “behavioural” remedies for cloud sector

2 days ago

Former Policy Boss At X, Nick Pickles, Joins Sam Altman Venture

Move to Elon Musk rival. Former senior executive at X joins Sam Altman's venture formerly…

2 days ago

Bitcoin Rises Above $96,000 Amid Trump Optimism

Bitcoin price rises towards $100,000, amid investor optimism of friendlier US regulatory landscape under Donald…

2 days ago