Jump to content

Apple's new USB security feature has a major flaw

ItsMitch

S: Engadget

 

Apple introduced a new security feature into iOS 11.4.1 yesterday but security researchers have already found flaws in the software which could allow law enforcement to bypass the security software. In a report from ElcomSoft they explain that a $39 USB 3 Camera Adapter from Apple can bypass it within specific parameters & requirements.


The flaw you may ask? 

Quote

With the release of iOS 11.4.1, the procedure for properly seizing and transporting iPhone devices may be altered to include a compatible Lightning accessory. Prior to iOS 11.4.1, isolating the iPhone inside a Faraday bag and connecting it to a battery pack would be enough to safely transport it to the lab. iOS 11.4.1 adds the need for another dongle setup. In order to fool USB Restricted Mode, one would need to perform the following steps:

  1. Connect the iPhone to a compatible Lightning accessory (such as the official Lightning to USB 3 Camera Adapter).
  2. Plug external battery pack to the adapter (to avoid iPhone battery drain).
  3. Place the entire assembly in a Faraday bag.

According to our tests, this effectively disables USB Restricted Mode countdown timer, and allows safely transporting the seized device to the lab.

If you get a message that the device should be unlocked in order to use the accessory (when you connect it), then USB restricted mode has been activated already, and there is nothing you can do about that, sorry.

What are the chances that the device is seized within in hour after last unlock? Quite high. We were not able to find recent stats, but even two years ago an average user unlock their iPhone at least 80 times a day.

 

It has been said that this could just be a gigantic oversight by Apple and it will most likely be fixed, but ElcomSoft do warn that this issue may be related to Apple's Lightning Communication Protocol.

 

Paper by Elcomsoft. 

https://blog.elcomsoft.com/2018/07/this-9-device-can-defeat-ios-usb-restricted-mode/ 

Summoning the LTT resident Mac Man @DrMacintosh for his insight on this (I don't use mac's nor apple devices)

 

tl;dr Law Enforcement can still grab your data if they act within the hour and do it properly. 

Link to comment
Share on other sites

Link to post
Share on other sites

LOL

CPU: AMD Ryzen 5 5600X | CPU Cooler: Stock AMD Cooler | Motherboard: Asus ROG STRIX B550-F GAMING (WI-FI) | RAM: Corsair Vengeance LPX 16 GB (2 x 8 GB) DDR4-3000 CL16 | GPU: Nvidia GTX 1060 6GB Zotac Mini | Case: K280 Case | PSU: Cooler Master B600 Power supply | SSD: 1TB  | HDDs: 1x 250GB & 1x 1TB WD Blue | Monitors: 24" Acer S240HLBID + 24" Samsung  | OS: Win 10 Pro

 

Audio: Behringer Q802USB Xenyx 8 Input Mixer |  U-PHORIA UMC204HD | Behringer XM8500 Dynamic Cardioid Vocal Microphone | Sound Blaster Audigy Fx PCI-E card.

 

Home Lab:  Lenovo ThinkCenter M82 ESXi 6.7 | Lenovo M93 Tiny Exchange 2019 | TP-LINK TL-SG1024D 24-Port Gigabit | Cisco ASA 5506 firewall  | Cisco Catalyst 3750 Gigabit Switch | Cisco 2960C-LL | HP MicroServer G8 NAS | Custom built SCCM Server.

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

Now that is why iDevices don't get viruses + will never get stolen or cracked!

 

Oh wait, it happened? Again, GOSH DARN APPLE!

When the PC is acting up haunted,

who ya gonna call?
"Monotone voice" : A local computer store.

*Terrible joke I know*

 

Link to comment
Share on other sites

Link to post
Share on other sites

6 minutes ago, Abdul201588 said:

LOL

It's not a vulnerability...... #fakenews, we just put it in there for the FBI and hopes no-one finds out.... 

Link to comment
Share on other sites

Link to post
Share on other sites

Quote

"once the police officer seizes an iPhone, he or she would need to immediately connect that iPhone to a compatible USB accessory to prevent USB Restricted Mode lock after one hour."

 

In other news, if you leave your phone unlocked, someone can make it stay unlocked by playing with it.

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, Christophe Corazza said:

In other news, if you leave your phone unlocked, someone can make it stay unlocked by playing with it.

in other news, reading the article is helpful in this situation and makes people look less silly :P 

Quote

The feature is designed to protect iPhones against USB devices used by law enforcement to crack your passcode, and works by disabling USB access after the phone has been locked for an hour.

If your phone has been locked within one hour, law enforcement can still get access to it by using a USB accessory, thus thwarting the security feature apple created to prevent intrusion. 

Link to comment
Share on other sites

Link to post
Share on other sites

8 minutes ago, SC2Mitch said:

If your phone has been locked within one hour, law enforcement can still get access to it by using a USB accessory, thus thwarting the security feature apple created to prevent intrusion. 

 

I've understood that this only helps if the iPhone has still not entered USB Restricted Mode.

But it also works after it being locked?!?! o.O

Link to comment
Share on other sites

Link to post
Share on other sites

I don't think someone can just pull a faraday cage out of nowhere.

Specs: Motherboard: Asus X470-PLUS TUF gaming (Yes I know it's poor but I wasn't informed) RAM: Corsair VENGEANCE® LPX DDR4 3200Mhz CL16-18-18-36 2x8GB

            CPU: Ryzen 9 5900X          Case: Antec P8     PSU: Corsair RM850x                        Cooler: Antec K240 with two Noctura Industrial PPC 3000 PWM

            Drives: Samsung 970 EVO plus 250GB, Micron 1100 2TB, Seagate ST4000DM000/1F2168 GPU: EVGA RTX 2080 ti Black edition

Link to comment
Share on other sites

Link to post
Share on other sites

4 minutes ago, williamcll said:

I don't think someone can just pull a faraday cage out of nowhere.

 

Why not? I've always got a spare on in my pocket :P;)

 

Seriously though, a Faraday bag is not that big though:

MOSEquipment_MissionDarkness_FaradayBag_SmallPhone_Top_1200px_large.jpg.8f10f862e5468526704d1bfa5c719584.jpg

This one conveniently already has an iPhone inside xD

Link to comment
Share on other sites

Link to post
Share on other sites

4 minutes ago, williamcll said:

I don't think someone can just pull a faraday cage out of nowhere.

You underestimate the use of the FBI and their responses to scenes of terror, shootings, etc. 

Link to comment
Share on other sites

Link to post
Share on other sites

Good thing iOS 12 is still in beta. No wonder Grayshift is bold enough to say they managed to circumvent URM. 

 

1 hour ago, SC2Mitch said:

If you get a message that the device should be unlocked in order to use the accessory (when you connect it), then USB restricted mode has been activated already, and there is nothing you can do about that, sorry.

What are the chances that the device is seized within in hour after last unlock? Quite high. We were not able to find recent stats, but even two years ago an average user unlock their iPhone at least 80 times a day.

But then again, URM will kick in after an hour. The OP explicitly states that the seized iPhone should be unlocked within an hour. I think one hour is a good enough grace period for law enforcement. But for the security conscious person, aside from not unlocking the device for an hour, rebooting the iPhone will also activate URM. 

There is more that meets the eye
I see the soul that is inside

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

1 hour ago, Christophe Corazza said:

 

I've understood that this only helps if the iPhone has still not entered USB Restricted Mode.

But it also works after it being locked?!?! o.O

An iPhone will enter USB Restricted Mode 1 hour after being locked.

 

This "bug" allows you to prevent USB Restricted Mode from being activated after 1 hour so you can later e.g. once you get to the nearest GrayKey can use the USB attack vector to unlock the phone.

Link to comment
Share on other sites

Link to post
Share on other sites

42 minutes ago, Christophe Corazza said:

 

Why not? I've always got a spare on in my pocket :P;)

 

Seriously though, a Faraday bag is not that big though:

MOSEquipment_MissionDarkness_FaradayBag_SmallPhone_Top_1200px_large.jpg.8f10f862e5468526704d1bfa5c719584.jpg

This one conveniently already has an iPhone inside xD

I’m guessing law enforcement will place iPhones inside faraday bags in order to temporarily disable remote locate and wipe features of iCloud which requires wifi or cellular data. 

There is more that meets the eye
I see the soul that is inside

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

4 minutes ago, captain_to_fire said:

But then again, URM will kick in after an hour. The OP explicitly states that the seized iPhone should be unlocked within an hour. I think one hour is a good enough grace period for law enforcement. But for the security conscious person, aside from not unlocking the device for an hour, rebooting the iPhone will also activate URM. 

The described method disables the timer so you can take as long as you like:

1 hour ago, SC2Mitch said:
  1. Connect the iPhone to a compatible Lightning accessory (such as the official Lightning to USB 3 Camera Adapter).
  2. Plug external battery pack to the adapter (to avoid iPhone battery drain).
  3. Place the entire assembly in a Faraday bag.

According to our tests, this effectively disables USB Restricted Mode countdown timer, and allows safely transporting the seized device to the lab.

 

Link to comment
Share on other sites

Link to post
Share on other sites

in @DrMacintosh own words:

 

One day I will be able to play Monster Hunter Frontier in French/Italian/English on my PC, it's just a matter of time... 4 5 6 7 8 9 years later: It's finally coming!!!

Phones: iPhone 4S/SE | LG V10 | Lumia 920 | Samsung S24 Ultra

Laptops: Macbook Pro 15" (mid-2012) | Compaq Presario V6000

Other: Steam Deck

<>EVs are bad, they kill the planet and remove freedoms too some/<>

Link to comment
Share on other sites

Link to post
Share on other sites

All people need to do is make sure that their phone locks every 1-2 minutes of no usage and keep their phone locked unless they need to unlock it.

 

E.g Checking the time doesn't require an unlock.

Judge a product on its own merits AND the company that made it.

How to setup MSI Afterburner OSD | How to make your AMD Radeon GPU more efficient with Radeon Chill | (Probably) Why LMG Merch shipping to the EU is expensive

Oneplus 6 (Early 2023 to present) | HP Envy 15" x360 R7 5700U (Mid 2021 to present) | Steam Deck (Late 2022 to present)

 

Mid 2023 AlTech Desktop Refresh - AMD R7 5800X (Mid 2023), XFX Radeon RX 6700XT MBA (Mid 2021), MSI X370 Gaming Pro Carbon (Early 2018), 32GB DDR4-3200 (16GB x2) (Mid 2022

Noctua NH-D15 (Early 2021), Corsair MP510 1.92TB NVMe SSD (Mid 2020), beQuiet Pure Wings 2 140mm x2 & 120mm x1 (Mid 2023),

Link to comment
Share on other sites

Link to post
Share on other sites

15 minutes ago, ScratchCat said:

The described method disables the timer so you can take as long as you like:

 

Thanks for the heads up. It’s definitely an oversight from Apple that needs patching and more penetration testing for iOS 12. 

There is more that meets the eye
I see the soul that is inside

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

From what I read, this flaw resets the one hour counter when a usb accessory is plugged in as long as the restricted mode isn't yet active. It sounds like law enforcement can plug in an accessory like the camera adapter and a power bank if the accessory allows pass through. Then once at the lab, switch the accessory to the GrayKey to unlock the iPhone. 

 

Apple can stop this workaround by not resetting the one hour counter. iOS could be configured to allow an accessory to connect during the one hour, but after that hour if the accessory is unplugged then the restricted mode activates. They should also consider blocking new usb connections after the one hour in the case of someone using a hub that would allow them to plug in the GrayKey without unplugging the original accessory.

 

I like that Apple is adding this feature, but I wish they would let users set the counter to what they want. I would rather have a very short time than the one hour because I have no problem with having to unlock my phone to connect an accessory.

Link to comment
Share on other sites

Link to post
Share on other sites

Haha all the isheep saying how great Apples security is and then stuff like this happens. It all started when Apple essentially challenged the government, grey market hackers, and anyone else that realized there was a huge profit to make from cracking Apple devices. There is no way one company can win a security war against a government and other for profit hackers. I'm not saying that Android is secure it's not either what I'm saying is Apple needs to drop the security illusion they are selling before it ruins them. They are in a race against tons of hackers and security researchers and right now they are losing bad and it's not helping that they are tripping over themselves in the process.

Link to comment
Share on other sites

Link to post
Share on other sites

49 minutes ago, Shorty88jr said:

There is no way one company can win a security war against a government and other for profit hackers.

Apple has been doing pretty well so far. It would seem you would rather companies not try to fight for you and would rather everyone just give up. Yeah no, I like my liberties thank you very much. 

Laptop: 2019 16" MacBook Pro i7, 512GB, 5300M 4GB, 16GB DDR4 | Phone: iPhone 13 Pro Max 128GB | Wearables: Apple Watch SE | Car: 2007 Ford Taurus SE | CPU: R7 5700X | Mobo: ASRock B450M Pro4 | RAM: 32GB 3200 | GPU: ASRock RX 5700 8GB | Case: Apple PowerMac G5 | OS: Win 11 | Storage: 1TB Crucial P3 NVME SSD, 1TB PNY CS900, & 4TB WD Blue HDD | PSU: Be Quiet! Pure Power 11 600W | Display: LG 27GL83A-B 1440p @ 144Hz, Dell S2719DGF 1440p @144Hz | Cooling: Wraith Prism | Keyboard: G610 Orion Cherry MX Brown | Mouse: G305 | Audio: Audio Technica ATH-M50X & Blue Snowball | Server: 2018 Core i3 Mac mini, 128GB SSD, Intel UHD 630, 16GB DDR4 | Storage: OWC Mercury Elite Pro Quad (6TB WD Blue HDD, 12TB Seagate Barracuda, 1TB Crucial SSD, 2TB Seagate Barracuda HDD)
Link to comment
Share on other sites

Link to post
Share on other sites

An unfortunate oversight. Thankfully Apple actually has a software update model so this error can be fixed in a subsequent update that everyone will be able to download and install right away. 

 

And again, a little reality check, Apple is still doing way more than anyone else in terms of user privacy and security......and it’s not like this is sending photos from your camera roll to peope in your contacts ?

Laptop: 2019 16" MacBook Pro i7, 512GB, 5300M 4GB, 16GB DDR4 | Phone: iPhone 13 Pro Max 128GB | Wearables: Apple Watch SE | Car: 2007 Ford Taurus SE | CPU: R7 5700X | Mobo: ASRock B450M Pro4 | RAM: 32GB 3200 | GPU: ASRock RX 5700 8GB | Case: Apple PowerMac G5 | OS: Win 11 | Storage: 1TB Crucial P3 NVME SSD, 1TB PNY CS900, & 4TB WD Blue HDD | PSU: Be Quiet! Pure Power 11 600W | Display: LG 27GL83A-B 1440p @ 144Hz, Dell S2719DGF 1440p @144Hz | Cooling: Wraith Prism | Keyboard: G610 Orion Cherry MX Brown | Mouse: G305 | Audio: Audio Technica ATH-M50X & Blue Snowball | Server: 2018 Core i3 Mac mini, 128GB SSD, Intel UHD 630, 16GB DDR4 | Storage: OWC Mercury Elite Pro Quad (6TB WD Blue HDD, 12TB Seagate Barracuda, 1TB Crucial SSD, 2TB Seagate Barracuda HDD)
Link to comment
Share on other sites

Link to post
Share on other sites

1 hour ago, x3x53530 said:

 

I like that Apple is adding this feature, but I wish they would let users set the counter to what they want.

This is one of those cases where Apple decides  what’s best. They’ve always walked a fine line between usability and functionality. 

 

They dont want peope setting it to some timeframe that breaks the usability or experience of the device. 

Laptop: 2019 16" MacBook Pro i7, 512GB, 5300M 4GB, 16GB DDR4 | Phone: iPhone 13 Pro Max 128GB | Wearables: Apple Watch SE | Car: 2007 Ford Taurus SE | CPU: R7 5700X | Mobo: ASRock B450M Pro4 | RAM: 32GB 3200 | GPU: ASRock RX 5700 8GB | Case: Apple PowerMac G5 | OS: Win 11 | Storage: 1TB Crucial P3 NVME SSD, 1TB PNY CS900, & 4TB WD Blue HDD | PSU: Be Quiet! Pure Power 11 600W | Display: LG 27GL83A-B 1440p @ 144Hz, Dell S2719DGF 1440p @144Hz | Cooling: Wraith Prism | Keyboard: G610 Orion Cherry MX Brown | Mouse: G305 | Audio: Audio Technica ATH-M50X & Blue Snowball | Server: 2018 Core i3 Mac mini, 128GB SSD, Intel UHD 630, 16GB DDR4 | Storage: OWC Mercury Elite Pro Quad (6TB WD Blue HDD, 12TB Seagate Barracuda, 1TB Crucial SSD, 2TB Seagate Barracuda HDD)
Link to comment
Share on other sites

Link to post
Share on other sites

15 minutes ago, DrMacintosh said:

Apple has been doing pretty well so far. It would seem you would rather companies not try to fight for you and would rather everyone just give up. Yeah no, I like my liberties thank you very much. 

Not at all what I said I said they shouldn't be saying that their devices are secure to the extent they would like people to believe when clearly companies have broken their security. 

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×