Passwords stored on a locked iPhone retrieved for six minutes using off-the-shelf exploits

May 2024 ยท 2 minute read
Researchers at the Fraunhofer Institute in Germany were able to retrieve a number of passwords from a locked iPhone, using known exploits. Instead of crunching the passcode, they jailbroke the device first, and then installed an SSH server on the phone that allows running software on it.

Then the researchers copied a Keychain (Apple's password management system) access script, and executed it to ultimately spill out the account passwords which are stored there. It was possible, because the cryptographic key is based on code you can find in the iOS device itself, and is not tied up to the passcode.

Thus the guys from the Fraunhofer Institute managed to retrieve the Gmail, Wi-Fi and some apps passwords, as well as the MS Exchange pass and the corporate VPN access code. The last two are particularly troubling, considering Apple is fighting hard to spearhead iOS devices adoption in the enterprise, even poaching talent from RIM.

To add insult to injury, it took the researchers a whole of six minutes with physical access to the phone to retrieve all of the above info. They even recorded it on video, so if someone didn't know before how to do it, now they can.

source: PCWorld

Video Thumbnail View Full Bio

Daniel, a devoted tech writer at PhoneArena since 2010, has been engrossed in mobile technology since the Windows Mobile era. His expertise spans mobile hardware, software, and carrier networks, and he's keenly interested in the future of digital health, car connectivity, and 5G. Beyond his professional pursuits, Daniel finds balance in travel, reading, and exploring new tech innovations, while contemplating the ethical and privacy implications of our digital future.

ncG1vNJzZmivp6x7sbTOp5yaqpWjrm%2BvzqZmp52nqHyRrdKsrqiqlKh6tMDOq5ydZZ%2BjeqJ5y6iapJ2UYraRtM6nnGaqlam%2FqrHVnptmnp%2BnerS112akoqalqbK0edSsoKefXaSzp3nToZxmq5iauad5xLGnpaeZqcCgtcNqbW9pZQ%3D%3D