{"id":13679,"date":"2018-10-25T14:30:02","date_gmt":"2018-10-25T22:30:02","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/10\/25\/news-7446\/"},"modified":"2018-10-25T14:30:02","modified_gmt":"2018-10-25T22:30:02","slug":"news-7446","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/10\/25\/news-7446\/","title":{"rendered":"Apple appears to have blocked GrayKey iPhone hacking tool"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2018\/04\/breaking_into_iphone_3x2_1200x800_iphone_unlock_breach_getty_images_erhui1979_493332844-100755004-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lucas Mearian| Date: Thu, 25 Oct 2018 14:09:00 -0700<\/strong><\/p>\n<p>Apple has apparently been able to permanently block de-encryption technology from a mysterious Atlanta-based company whose blackbox device was embraced by government agencies to bypass iPhone passcodes.<\/p>\n<p>Atlanta-based Grayshift\u00a0is one of two companies that claimed it could thwart Apple iPhone passcode security through brute-force attacks.<\/p>\n<p>The blackbox technology purportedly worked, as Grayshift\u2019s technology was snapped up by regional law enforcement and won contracts with Immigration and Customs Enforcement (ICE) and the U.S. Secret Service.<\/p>\n<p>Another vendor, Israel-based Cellebrite, also discovered a way to unlock encrypted iPhones running iOS 11 and marketed its product to law enforcement and private forensics firms around the world. According to\u00a0<a href=\"https:\/\/www.documentcloud.org\/documents\/4386077-iPhone-X-Cellebrite-Extraction.html\" rel=\"noopener nofollow\" target=\"_blank\">a police warrant obtained by\u00a0<em>Forbes,<\/em><\/a>\u00a0the U.S. Department of Homeland Security tested the technology.<\/p>\n<p>Multiple sources familiar with the GrayKey <a href=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2018\/10\/24\/apple-just-killed-the-graykey-iphone-passcode-hack\/#4f6008415318\" rel=\"noopener nofollow\" target=\"_blank\">have told <em>Forbes<\/em><\/a> that the device can no longer break the passcodes of any iPhone running iOS 12 or above.\u00a0<\/p>\n<p>iOS 12 was released by Apple last month.<\/p>\n<p>\u00a0The use of Grayshift&#8217;s de-encrypting device \u2013 a 4-in. x 4-in. box with two iPhone-compatible Lightning cables \u2013 was first discovered by <em>Motherboard<\/em>; it reviewed police department public records and emails obtained from federal agencies that revealed purchases of the device. The GrayKey box could apparently\u00a0unlock an iPhone in about two hours if the owner used a four-digit passcode and three days or longer if a six-digit passcode was used.<\/p>\n<p>Grayshift competitor Cellebrite also sold its Universal Forensic Extraction Device (UFED) to law enforcement agencies, including a $558,000 contract signed with ICE in August, according to a <a href=\"https:\/\/www.epic.org\/foia\/ice\/mobile-forensics\/1-Complaint.pdf\" rel=\"noopener nofollow\" target=\"_blank\">Freedom of Information Act request<\/a> filed by the Electronic Privacy Information Center (EPIC).<\/p>\n<p>\u00a0A request for comment today from Apple was not immediately returned.<\/p>\n<p>The UFED Cloud Analyzer tool can unlock, decrypt, and extract phone data, including \u201creal-time mobile data \u2026 call logs, contacts, calendar, SMS, MMS, media files, apps data, chats, passwords,\u201d according to the FOIA request.<\/p>\n<p>The technology can also extract private information without a passcode from private cloud-based accounts, such as those used by Facebook, Gmail, iCloud, Dropbox, and WhatsApp.<\/p>\n<p>In February,\u00a0<a href=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2018\/02\/26\/government-can-access-any-apple-iphone-cellebrite\/#3ea983bc667a\" rel=\"noopener nofollow\" target=\"_blank\">reports surfaced<\/a> that Cellebrite had discovered a way to unlock encrypted iPhones running iOS 11 and was marketing the product to law enforcement and private forensics firms around the world. According to\u00a0<a href=\"https:\/\/www.documentcloud.org\/documents\/4386077-iPhone-X-Cellebrite-Extraction.html\" rel=\"noopener nofollow\" target=\"_blank\">a police warrant obtained by\u00a0<em>Forbes,<\/em><\/a>\u00a0the U.S. Department of Homeland Security had been testing the technology. It was not immediately clear if the iOS 12 changes affect the Cellebrite technology.<\/p>\n<p>Earlier this year,\u00a0<a href=\"https:\/\/graykey.grayshift.com\/\" rel=\"noopener nofollow\" target=\"_blank\">Grayshift<\/a>\u00a0emerged as a different company that had\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/03\/graykey-iphone-unlocker-poses-serious-security-concerns\/\" rel=\"nofollow noopener\" target=\"_blank\">developed an inexpensive black box that could unlock any iPhone<\/a>; <a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/vbxxxd\/unlock-iphone-ios11-graykey-grayshift-police\" rel=\"noopener nofollow\" target=\"_blank\">Motherboard reported<\/a>\u00a0that local and regional U.S. police departments and the federal government had been purchasing the technology.<\/p>\n<p>Grayshift reportedly hired a former Apple security engineer.<\/p>\n<p>Nate Cardozo, a senior staff attorney with the\u00a0<a href=\"https:\/\/www.eff.org\/\" rel=\"noopener nofollow\" target=\"_blank\">Electronic Frontier Foundation<\/a>\u00a0(EFF), a non-profit digital rights group, said earlier this year he believed the reports that the iPhone&#8217;s encryption had been cracked. Otherwise, law enforcement agencies wouldn&#8217;t be purchasing the hacking technology.<\/p>\n<p>&#8220;The FBI huffed and puffed and said couldn&#8217;t get into the iPhone, and then we found out that&#8217;s not true&#8230;the literal night before the court hearing [to decide the case],&#8221; Cardozo said.<\/p>\n<p>He was referring to the investigation of\u00a0San Bernardino gunman Syed Rizwan Farook.\u00a0 The FBI initially maintained it\u00a0<a href=\"https:\/\/www.lawfareblog.com\/fbi-director-christopher-wrays-remarks-encryption-international-conference-cyber-security\" rel=\"noopener nofollow\" target=\"_blank\">was unable to crack<\/a>\u00a0the passcode on an iPhone used by Farook.<\/p>\n<p>The Justice Department\u00a0<a href=\"http:\/\/www.latimes.com\/local\/lanow\/la-me-ln-fbi-drops-fight-to-force-apple-to-unlock-san-bernardino-terrorist-iphone-20160328-story.html\" rel=\"noopener nofollow\" target=\"_blank\">petitioned the courts<\/a>\u00a0to force Apple to comply with an order to unlock the device; a judge granted the request, but delayed making a final decision until hearing arguments from both sides. The evening before a court hearing to decide the matter, the agency announced it had gotten help from an outside group.<\/p>\n<p>The FBI&#8217;s attempts to get Apple to help with unencrypting the iPhone were rebuffed. Apple maintained that\u00a0<a href=\"https:\/\/www.computerworld.com\/article\/3033926\/security\/apple-encryption-fight-with-fbi-could-go-to-the-supreme-court.html\">to break into one iPhone<\/a>\u00a0would weaken security for all others.<\/p>\n<p>The news that two iPhone unencrypting methods were widely available to government agencies did not surprise analysts, who said it was inevitable.<\/p>\n<p>&#8220;There is no such thing as unbreakable encryption,&#8221; said Jack Gold, principal analyst with\u00a0<a href=\"http:\/\/www.jgoldassociates.com\/\" rel=\"nofollow\">J. Gold Associates<\/a>. &#8220;The idea is to make it as hard as possible by adding layers of encryption or long keys to encode, decode. But a determined decoder can crack it, given enough tools and enough time.&#8221;<\/p>\n<p>The GrayKey box retails for $15,000. That model is geofenced to a specific location, requiring an internet connection that enables up to 300 unlocks. There is also a $30,000 GrayKey model that can be used independent of internet connectivity and offers an unlimited number of device unlocks, according to\u00a0<em>Motherboard<\/em>.<\/p>\n<p>Conversely, Cellebrite charges $5,000 to unlock a single iPhone, according to\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/03\/graykey-iphone-unlocker-poses-serious-security-concerns\/\" rel=\"noopener nofollow\" target=\"_blank\">Malwarebytes<\/a>.<\/p>\n<p>EFF&#8217;s Cardozo said consumers shouldn&#8217;t be overly concerned about iPhone-cracking technology because law enforcement agencies must still obtain a court-issued warrant to unlock a device.<\/p>\n<p>But those concerned about privacy rights should realize that once cracking technology becomes available, it&#8217;s reasonable to believe law enforcement agencies won&#8217;t be the only ones to gain access to it.<\/p>\n<p>\u201cIf you believe the only people with access to GrayKey or Cellebrite are the cops, I&#8217;ve got a bridge to sell you,&#8221; Cardozo said.\u00a0<\/p>\n<p>Apple took its own steps to further limit unauthorized access to locked iOS devices.\u00a0In its\u00a0<a href=\"https:\/\/www.apple.com\/newsroom\/2018\/01\/apple-previews-ios-11-3\/\" rel=\"noopener nofollow\" target=\"_blank\">beta release of iOS 11.3<\/a>, Apple introduced a feature known as USB Restricted Mode.<\/p>\n<p>Security software vendor\u00a0<a href=\"https:\/\/blog.elcomsoft.com\/2018\/05\/ios-11-4-to-disable-usb-port-after-7-days-what-it-means-for-mobile-forensics\/\" rel=\"noopener nofollow\" target=\"_blank\">Elcomsoft first discovered the new feature<\/a>, which was buried deep within the beta release documentation. The feature was apparently cut from iOS 11.3 before it was released publicly.<\/p>\n<p>The documentation described the new feature as a way &#8220;to improve security.&#8221;<\/p>\n<p>&#8220;For a locked iOS device to communicate with USB accessories you must connect an accessory via Lightning connector to the device while unlocked \u2014 or enter your device passcode while connected \u2014 at least once a week.&#8221;<\/p>\n<p>If an iOS device is not unlocked after seven days, an iPhone&#8217;s or iPad&#8217;s Lightning port turns into nothing more than a charging port, locking out any data connection at the USB-interface level, according to Elcomsoft&#8217;s description.<\/p>\n<p>&#8220;Its effect on passcode unlocking techniques developed by Cellebrite and Grayshift is yet to be seen,&#8221; Elcomsoft explained in its blog post.<\/p>\n<p>Just this week, Apple CEO Tim Cook <a href=\"https:\/\/www.computerworld.com\/article\/3315623\/security\/complete-transcript-video-of-apple-ceo-tim-cooks-eu-privacy-speech.html\">reiterated the company&#8217;s efforts to protect user privacy<\/a> at\u00a0a conference of European privacy commissioners in Brussels.<\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3268729\/apple-ios\/apple-appears-to-have-blocked-graykey-iphone-hacking-tool.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2018\/04\/breaking_into_iphone_3x2_1200x800_iphone_unlock_breach_getty_images_erhui1979_493332844-100755004-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lucas Mearian| Date: Thu, 25 Oct 2018 14:09:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>Apple has apparently been able to permanently block de-encryption technology from a mysterious Atlanta-based company whose blackbox device was embraced by government agencies to bypass iPhone passcodes.<\/p>\n<p>Atlanta-based Grayshift\u00a0is one of two companies that claimed it could thwart Apple iPhone passcode security through brute-force attacks.<\/p>\n<p>The blackbox technology purportedly worked, as Grayshift\u2019s technology was snapped up by regional law enforcement and won contracts with Immigration and Customs Enforcement (ICE) and the U.S. Secret Service.<\/p>\n<p>Another vendor, Israel-based Cellebrite, also discovered a way to unlock encrypted iPhones running iOS 11 and marketed its product to law enforcement and private forensics firms around the world. According to\u00a0<a href=\"https:\/\/www.documentcloud.org\/documents\/4386077-iPhone-X-Cellebrite-Extraction.html\" rel=\"noopener nofollow\" target=\"_blank\">a police warrant obtained by\u00a0<em>Forbes,<\/em><\/a>\u00a0the U.S. Department of Homeland Security tested the technology.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3268729\/apple-ios\/apple-appears-to-have-blocked-graykey-iphone-hacking-tool.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[2211,11070,10480,10554,714],"class_list":["post-13679","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-apple","tag-emerging-technology","tag-ios","tag-mobile","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13679","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13679"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13679\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13679"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13679"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13679"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}