Apple closed the iPhone deficit used in a highly sophisticated attack

13
Apple closed the iPhone deficit used in a highly sophisticated attack
Apple has released iOS 18.3.1 and iPados 18.3.1 updates to eliminate a critical vulnerability that affects iPhone and iPad users. The company said that the deficit may have been used for specific targets within the scope of a “highly sophisticated attack”. The company did not detail the definition of a “specific target” here.

Data on the devices can be accessed

According to Apple’s security notes, it allowed to disable the limited USB Mode on an open, locked device. This feature, introduced in 2018, prevents the iPhone or iPad from transferring data via USB connection if the lock is not opened for seven days. Apple, last year, in addition to the devices within 72 hours in addition to the automatically restarted security measures had brought. In the iOS 18.3.1 and iPados 18.3.1 version notes, the company said that the relevant vulnerability allowed the relevant vulnerability to disable the restricted USB Mode in a “locked device”.

With this deficit, the attackers can physically access a Apple device and access data through USB connection. In particular, people or institutions using judicial information analysis tools such as Cellebrite and Graykey may have abused this vulnerability. Such devices are used by security forces or malicious actors to unlock iPhones and access the data in it.

Bill Marczak, a senior researcher at Citizen LAB within Toronto University, who detected the vulnerability, refrained from making detailed comment on the issue. Apple has not yet made an official statement. It remains unclear who the attack was carried out by who or who targets it. However, in the past, similar tools were documented that they were used for non -governmental representatives, journalists and activists.