Apple Has Disputed Security Expert’s Claim Of Brute Force Passcode Hack

Posted: Jun 27 2018, 8:40am CDT | by , in Apple


This story may contain affiliate links.

Apple Has Disputed Security Expert’s Claim of Brute Force Passcode Hack

Apple Denies Passcode Vulnerability In iOS.

A day after a security researcher shared a new method to breach iPhone security and unlock the device by using a brute force attack, on Saturday, Apple finally responded to the vulnerability claims.

Apple officials stated that all such claims were wrong, and their devices are completely safe from any kind of hacking techniques. They even said that the security researcher had not properly tested the device and made the claims without having proper knowledge about the iOS’s security protocols.

Earlier, Matthew Hickey, a security researcher shared a very simple method to bypass security features of an iPhone and hack the device by use of brute force attacks.

For security reasons, following the entry of ten consecutive wrong passwords, iPhone wipes out all data that is stored on the device, so this leaves no chance for a brute force password hack.

However, Hickey had shared that instead of ten separate passwords, a consecutive string of all combinations from 0000 to 9999 (no spaces in between) entered through lightening port of the device did not trigger the security mechanism of the iPhone.

Hickey further added that this vulnerability in the operating system can be exploited by hackers to unlock the devices. Since the data wipe security mechanism does not trigger, a brute force attack can be used to hack the iPhone.

Whereas, Apple said the security researcher had errors in his findings.

"The recent report about a passcode bypass on the iPhone was in error, and a result of incorrect testing," Apple said.

And it seems Apple is right too, by another post on Twitter, Hickey also mentioned that the trick he mentioned may not work as he had thought earlier.

It seems Hickey jumped to the conclusions a little too fast and shared it on social media without first properly testing his findings. And apparently, by the comments made on different websites, it seems he made a good mockery of himself too.

"It seems @i0n1c may be right; the pins don't always go to the SEP in some instances (due to pocket dialing / overly fast inputs) so although it 'looks' like pins are being tested, they aren't always sent, and so they don't count, the devices register fewer counts than visible," Hickey said in a tweet.

By now, the claims made by Hickey are also not backed by any third-party security expert or company.

Apple also mentioned that with a new update a new “USB restricted mode” feature would be added to their operating system, this will remove any chances of a possible hack by using the USB port.

This story may contain affiliate links.


Find rare products online! Get the free Tracker App now.

Download the free Tracker app now to get in-stock alerts on Pomsies, Oculus Go, SNES Classic and more.

Latest News


The Author

<a href="/latest_stories/all/all/2" rel="author">Luigi Lugmayr</a>
Manfred "Luigi" Lugmayr () is the founding Chief Editor of I4U News and brings over 25 years experience in the technology field to the ever evolving and exciting world of gadgets, tech and online shopping. He started I4U News back in 2000 and evolved it into vibrant technology news and tech and toy shopping hub.
Luigi can be contacted directly at ml[@]




comments powered by Disqus