{"id":13380,"date":"2018-09-18T10:30:11","date_gmt":"2018-09-18T18:30:11","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2018\/09\/18\/news-7147\/"},"modified":"2018-09-18T10:30:11","modified_gmt":"2018-09-18T18:30:11","slug":"news-7147","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/09\/18\/news-7147\/","title":{"rendered":"Easy way to bypass passcode lock screens on iPhones, iPads running iOS 12"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.techhive.com\/images\/article\/2016\/03\/img_2681-100648199-primary.idge.jpg\"\/><\/p>\n<p><strong>Credit to Author: Darlene Storm, \t\t\t\t\t\t \t\t\t\t\t\t\tMichelle Davidson| Date: Tue, 18 Sep 2018 11:16:00 -0700<\/strong><\/p>\n<p>With iOS 12 and iPhones that have Touch ID, you can still bypass the iPhone lock screen and trick Siri into getting into a person&#8217;s phone. The bypass is the same as it was in earlier versions of the operating system:<\/p>\n<p>Siri then opens the cellular data settings where you can turn off cellular data.<\/p>\n<p>As was the case before, anyone can do this. It doesn&#8217;t have to be the person who &#8220;trained&#8221; Siri.<\/p>\n<p>By also turning off cellular, you cut off Siri\u2019s access to cellular networks. You will get an error saying, \u201cSiri not available. You are not connected to the internet.\u201d But you don\u2019t care about that error because you have already bypassed the iPhone lock screen. If the device is on a Wi-Fi network, however, that connectivity will remain.<\/p>\n<p><strong>Other privacy holes remain for Touch ID devices running iOS 12<\/strong><\/p>\n<p>Still an issue for iPhones that have Touch ID: Anyone can use Siri to read your new\/unread text messages, send text messages, send email, and see your most recent phone call.<\/p>\n<p>To do that, again prompt Siri to wake up using a finger not associated with the phone&#8217;s authentication. Then say, \u201cRead messages,\u201d and Siri will read any unread text messages from the lock screen. Say, &#8220;Send a text message [person&#8217;s name],&#8221; and Siri will let you dictate a message and send it. Say, &#8220;Show me recent calls,&#8221; and Siri will display your most recent phone call. Say, \u201cSend an email to [person\u2019s name],\u201d and Siri will let you dictate an email and send it.<\/p>\n<p><strong>Apple patches privacy holes on iPhone X-series phones<\/strong><\/p>\n<p>Apple has patched the privacy hole with the iPhone X-series phones, which all use Face ID to unlock the phones. There is no way to force Siri to activate on these devices and let non-owners access text messages, phone call logs, email, or other apps.<\/p>\n<p>Further, future iPhones will all have Face ID. Touch ID, while still supported on iPhones up to the iPhone 8 series, will not be included on new devices.<\/p>\n<p><strong>Lock down your privacy<\/strong><\/p>\n<p>Until Apple patches the privacy hole in iPhones that have Touch ID \u2014 or until you can upgrade to an iPhone X-series device \u2014 your best option is to disable Siri from the lock screen.<\/p>\n<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<\/p>\n<p>With iOS 11, you can still bypass the iPhone lock screen and trick Siri into getting into a person&#8217;s phone. The bypass is the same as it was in the earlier version of the operating system:<\/p>\n<p>Siri then opens the cellular data settings where you can turn off\u00a0cellular data.<\/p>\n<p>As was the case before, anyone can do this. It doesn&#8217;t have to be the person who &#8220;trained&#8221; Siri.<\/p>\n<p>By also turning off Wi-Fi, you cut off her connectivity access. You will get an error saying, \u201cSiri not available. You are not connected to the internet.\u201d But you don\u2019t care about that error because you have already bypassed the iPhone lock screen.<\/p>\n<p><strong>Other privacy holes remain<\/strong><\/p>\n<p>Also still an issue: Anyone can use Siri to read your new\/unread text messages, send text messages and see your most recent phone call.<\/p>\n<p>To do that, again prompt Siri to wake up using a finger not associated with the phone&#8217;s authentication. Then say, \u201cRead messages,\u201d and Siri will read any unread text messages from the lock screen. Say, &#8220;Send a text message [person&#8217;s name],&#8221; and Siri will let you dictate a message and send it. Say, &#8220;Show me recent calls,&#8221; and Siri will display your most recent phone call.<\/p>\n<p><strong>Facebook privacy hole closed<\/strong><\/p>\n<p>Apple has closed the hole that allowed you to command Siri to post to Facebook. Now, she tells you she can&#8217;t do it and gives you a button to open Facebook. You need to enter the passcode for the device to open the app.<\/p>\n<p><strong>Lock down your privacy<\/strong><\/p>\n<p>Until Apple patches the hole that lets you bypass the lock screen and let you command Siri, your best option is to disable Siri from the lock screen.<\/p>\n<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<\/p>\n<p>Apple still has not patched the hole allowing you to bypass the iPhone lock screen. As of iOS 10.3.2 (and the 10.3.3 beta), you can still trick Siri into getting into a person\u2019s iPhone.<\/p>\n<p>It works like this:<\/p>\n<p>Siri will then open the cellular data settings where you can turn off cellular data.<\/p>\n<p>Anyone can do this\u2014it doesn\u2019t have to be the person who \u201ctrained\u201d Siri.<\/p>\n<p>By also turning off Wi-Fi, you cut off her connectivity access. You will get an error saying, \u201cSiri not available. You are not connected to the internet.\u201d But you don\u2019t care about that error because you have already bypassed the iPhone lock screen.<\/p>\n<p><iframe loading=\"lazy\"  src=\"https:\/\/www.youtube.com\/embed\/_Zy_HzK_G4o\" width=\"100%\" height=\"420\" frameborder=\"0\" ><\/iframe> <\/p>\n<p>Not only can someone trick Siri to turn off cellular data, but they can trick her to read unread text messages and post to Facebook\u2014a major privacy issue.<\/p>\n<p>To do it, again prompt Siri to wake up using a finger not associated with the phone&#8217;s authentication. Then say, \u201cRead messages,\u201d and Siri will read any unread text messages from the lock screen. Or say, \u201cPost to Facebook,\u201d and Siri will ask you what you want to post to Facebook.<\/p>\n<p>We tested this with a staffer\u2019s iPhone 7, with someone other than the iPhone owner giving the commands. Siri let the person right in.<\/p>\n<p>While we wait for Apple to patch the hole, your best option is to disable Siri from the lock screen.<\/p>\n<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<\/p>\n<p>There are multiple bypass vulnerabilities which could allow an attacker to get past the passcode lock screen on Apple devices running iOS 9.<\/p>\n<p>The details for four different attack scenarios were <a href=\"http:\/\/www.vulnerability-lab.com\/get_content.php?id=1778\" rel=\"nofollow noopener\" target=\"_blank\">disclosed<\/a> by Vulnerability Lab. It\u2019s important to note that an attacker would need physical access to the device to pull this off; that being said, the advisory says the hacks were successfully executed on iPhone models 5, 5s, 6 and 6s as well as iPad models Mini, 1 and 2 running iOS 9 versions 9.0, 9.1 and 9.2.1.<\/p>\n<p>Security researcher Benjamin Kunz Mejri, who <a href=\"https:\/\/www.youtube.com\/watch?v=V-9lE1L3nq0\" rel=\"nofollow noopener\" target=\"_blank\">disclosed<\/a> a <a href=\"http:\/\/www.vulnerability-lab.com\/get_content.php?id=1710\" rel=\"nofollow noopener\" target=\"_blank\">different method<\/a> for disabling the passcode lock screen on iOS 8 and iOS 9 about a month ago, discovered the flaws. Vulnerability Lab posted a <a href=\"https:\/\/www.youtube.com\/watch?v=-XLlpnjZXFM\" rel=\"nofollow noopener\" target=\"_blank\">proof-of-concept video<\/a> showing multiple new ways for a local attacker to bypass the passcode in iOS 9 and gain unauthorized access to the device.<\/p>\n<p>\u201cLocal attackers can use Siri, the event calendar or the available clock module for an internal browser link request to the App Store that is able to bypass the customer\u2019s passcode or fingerprint protection mechanism,\u201d the <a href=\"http:\/\/seclists.org\/fulldisclosure\/2016\/Mar\/15\" rel=\"nofollow noopener\" target=\"_blank\">disclosure<\/a> states. The attacks exploit vulnerabilities \u201cin App Store, Buy more Tones or Weather Channel links of the clock, event calendar and Siri user interface.\u201d<\/p>\n<p>There are four attack scenarios explained in the disclosure and demonstrated in the proof-of-concept <a href=\"https:\/\/www.youtube.com\/watch?v=-XLlpnjZXFM\" rel=\"nofollow noopener\" target=\"_blank\">video<\/a>; each begins on an iOS device with a locked passcode.<\/p>\n<p>The first scenario involves pushing the Home button to activate Siri and asking her to open a non-existing app. Siri responds that you have no such app, but she \u201ccan help you look for it on the App Store.\u201d Tapping on the App Store button opens a \u201ca new restricted browser window.\u201d Either select update and open the last app, or \u201cpush twice on the Home button\u201d for the task slide preview to appear. Swipe over to the active front screen task and that bypassed the passcode lock screen on iPhone models 5, 5s, 6 and 6s.<\/p>\n<p>The second scenario is similar, first pushing on the Home button for two seconds to activate Siri and then asking to open the clock app. Switch to world clock in the bottom module and tap the image for the Weather Channel LLC network; if the weather app is deactivated by default, then a new restricted browser window will open which has App Store menu links. Click update and open the last app, or tap twice on the Home button to get to task slide preview. Swipe over to the active front screen and voila \u2013 passcode lock screen bypassed again; this reportedly works on iPhone models 5, 5s, 6 and 6s.<\/p>\n<p><iframe loading=\"lazy\"  src=\"https:\/\/www.youtube-nocookie.com\/embed\/-XLlpnjZXFM?rel=0\" width=\"100%\" height=\"420\" frameborder=\"0\" ><\/iframe> <\/p>\n<p>The third attack scenario works on iPad model 1 and 2, but basically follows the same steps as scenario two to bypass the passcode and gain unauthorized access to the device.<\/p>\n<p>The fourth way to bypass the lock screen passcode involves forcing Siri to open by pushing the Home button and asking her to \u201copen Events\/Calendar app.\u201d An attacker could tap the \u201cInformation of Weather Channel\u201d link which is found at the bottom of the screen next to the \u201cTomorrow module.\u201d If the weather app is deactivated by default, then a new restricted browser window opens with App Store links. Tap update and open the last app, or push twice on the Home button to bring up the task slide preview. Swipe over to select the active front screen and the passcode on the lock screen is bypassed.<\/p>\n<p>Although the Apple security team was reportedly notified on January 4, there are no dates listed in the vulnerability disclosure timeline for Apple responding or developing a patch. Vulnerability Lab proposed the following temporary solution for users to harden device settings:<\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3041302\/security\/4-new-ways-to-bypass-passcode-lock-screen-on-iphones-ipads-running-ios-9.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.techhive.com\/images\/article\/2016\/03\/img_2681-100648199-primary.idge.jpg\"\/><\/p>\n<p><strong>Credit to Author: Darlene Storm, \t\t\t\t\t\t \t\t\t\t\t\t\tMichelle Davidson| Date: Tue, 18 Sep 2018 11:16:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<h2>Update for iOS 12<\/h2>\n<p>With iOS 12 and iPhones that have Touch ID, you can still bypass the iPhone lock screen and trick Siri into getting into a person&#8217;s phone. The bypass is the same as it was in earlier versions of the operating system:<\/p>\n<ul>\n<li>Press the home button using a finger not associated with your fingerprint authentication, prompting Siri to wake up.<\/li>\n<li>Say to Siri: Cellular data.<\/li>\n<\/ul>\n<p>Siri then opens the cellular data settings where you can turn off cellular data.<\/p>\n<aside class=\"fakesidebar\"><strong>[ Further reading: <a href=\"https:\/\/www.computerworld.com\/article\/3268994\/apple-ios\/how-to-use-a-strong-passcode-to-better-secure-your-iphone.html\">How to use a strong passcode to better secure your iPhone<\/a> ]<\/strong><\/aside>\n<p>As was the case before, anyone can do this. It doesn&#8217;t have to be the person who &#8220;trained&#8221; Siri.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3041302\/security\/4-new-ways-to-bypass-passcode-lock-screen-on-iphones-ipads-running-ios-9.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[2211,11796,10480,8826,714],"class_list":["post-13380","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-apple","tag-cyber-crime","tag-ios","tag-iphone","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13380","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13380"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13380\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13380"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13380"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13380"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}