Tech giant Apple fixed a vulnerability that “may have been leveraged in a highly sophisticated campaign against specific targeted individuals” in its iOS and iPadOS mobile operating system updates earlier this week.
According to the company’s release notes for iOS 18.3.1 and iPadOS 18.3.1, the vulnerability made it possible to disable USB Restricted Mode “on a locked device.” A security feature known as USB Restricted Mode was first introduced in 2018 and prevents an iPhone or iPad from sending data via a USB connection if the device hasn’t been unlocked for seven days.
In order to make it more challenging for law enforcement or criminals employing forensic tools to access data on those devices, Apple announced a new security feature last year which triggers devices to reboot if they are not unlocked for 72 hours.
Based on the language used in its security update, Apple suggests that the attacks were most likely carried out with physical control of a person’s device, implying that whoever exploited this vulnerability had to connect to the person’s Apple devices using a forensics device
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
This article has been indexed from CySecurity News – Latest Information Security and Hacking Incidents
Read the original article: