iPhone X Vulnerability Deleted Images
iPhone X Vulnerability Deleted Images

Erase the “evidence” is usually the recommended action when our smartphone contains compromising images. Normally eliminate those photos or worse generates relief for those who could be harmed by them unless they have an iPhone because a new vulnerability in Apple devices would recover image files even if they have been deleted.

The discovery was made by hackers Richard Zhu and Amat Cama during their participation in the Mobile Pwn2Own 2018 held in Tokyo and where specialists are paid for discovering this type of security breaches in computers from Apple and the main Android manufacturers.

Zhu and Cama, formed the team “Fluoracete”, detected this dangerous vulnerability in the iPhone X and their discovery was worth a bag of $ 60,000.

To detect the failure, the hackers used a completely patched iPhone X, which could violate the security through WiFi. The exploit was made through a vulnerability in Safari.

The ‘Deleted’ folder collects the deleted documents from the phone gallery during the last thirty days, with the possibility of being restored by the owner of the phone, and once this time has passed, they disappear definitively. The two hackers were able to extract a photograph by using a public Wi-Fi network to which they connected.

To achieve this, Zhu and Cama discovered the vulnerability in the JIT (Just-in-time) compiler, a software that translates codes from bytes to machine code at runtime. In terms that are not too technical, JIT can significantly improve the performance of an application or system, since code translation is done at the time of using the software and not before.

  Goodbye cowboy: Apple declares iPhone 5 obsolete

Both hackers warned that these attacks could be carried out in real environments through malicious Wi-Fi hotspots, as happens in the Metro CDMX, for example.

While the attack demonstrated by Fluoroacetate was specifically against the iOS mobile operating system, it is not ruled out that the users of the mac are at risk, given that there are some libraries shared with the macOS operating system.

Leave a Reply