An iPhone X Vulnerability Allows Hackers To Access Deleted Pictures

  • 262
  •  
  •  
  •  
  •  
  •  
  •  
    262
    Shares

Recently, two researchers have demonstrated how an iPhone X vulnerability that could allow an attacker to access deleted pictures.

iPhone X Vulnerability Allows Hacking Deleted Pictures

At the recently ended Pwn2Own 2018 contest, two researchers demonstrated their hacking skills as they strived to win the contest. Yet, while doing so, they meddled with the iPhone X revealing an awkward hack. They allegedly discovered an iPhone X vulnerability that lets an attacker retrieve deleted files and photos.

The duo, Richard Zhu and Amat Cama, joined hands as fluoroacetate to discover the hack. As demonstrated, the hack simply involves exploiting the “recently deleted” feature in iPhone X. An iPhone retains any deleted file or picture for 30 days as “recently deleted”, after which, it disappears forever. After the 30-day time period, not even Apple stores the file (as claimed). However, during this time, the deleted files or photos remain vulnerable to being recovered.

The researchers exploited a vulnerability in the Apple Safari browser on a device running on iOS 12.1. Trend Micro’s Zero Day Initiative confirmed the hack in a tweet.

While the researchers retrieved a picture during the hack, the trick supposedly works to retrieve almost any deleted file.

Fix Maybe Coming

After the hackers presented details, Zero Day Initiative disclosed it in another tweet.

As per the contest rules, Apple has been reported of the vulnerability. Hence, we may expect a fix to mitigate the flaw soon. Until then, iPhone X users need to stay wary of any possible hacks until a fix arrives.

While the users may be a bit troubled after the discovery, the hack brought some good fortune for fluoroacetate. Successful demonstration of this flaw made them win $50,000 with 8 Master-of-Pwn points.

This vulnerability marks just another glitch in iOS 12.1 posing a security threat to the users. It hasn’t been a while that we came to know of a lock screen bypass by exploiting Group Facetime.

The following two tabs change content below.
Avatar

Abeerah Hashim

Abeerah has been a passionate blogger for several years with a particular interest towards science and technology. She is crazy to know everything about the latest tech developments. Knowing and writing about cybersecurity, hacking, and spying has always enchanted her. When she is not writing, what else can be a better pastime than web surfing and staying updated about the tech world! Reach out to me at: [email protected]
Avatar

Abeerah Hashim

Abeerah has been a passionate blogger for several years with a particular interest towards science and technology. She is crazy to know everything about the latest tech developments. Knowing and writing about cybersecurity, hacking, and spying has always enchanted her. When she is not writing, what else can be a better pastime than web surfing and staying updated about the tech world! Reach out to me at: [email protected]

Do NOT follow this link or you will be banned from the site!