Apple has been at the top since the time it released its very first product in the market.
The cost of the product of Apple is definitely very high compared to the other companies but the features and specifications they provide are very unique and so different in so many ways.
This is the reason for which there are millions of Apple users. Apple users are always seen satisfied with the Apple products they are using, may it be an iPhone, an iPad, an iPod, or even a Mac device.
But, the development of technology has made hackers discover various extremely innovative ways of getting access to different devices and gaining complete control over it.
This is something that is not at all acceptable. Apple is such a renowned firm and if the products launched by them carry these kinds of bugs or hacks along with them, it is obvious for the Apple product owners to get much excited.
So, as a consequence, this article will let you know about a flaw that has already created a huge mess in the Apple community along with the subcultures of the community of the security researchers.
The flaw, hack, or the bug that you will be getting to know about here is something that has got itself introduced in thousands of Apple products such as iPhones, iPads, and also iPods.
This flaw is something that is also known to be something for which no fixation method is applicable.
So, the development of technology led to the advancement in coding.
And, as a consequence, the hackers also could easily manage to create advanced techniques to insert more harmful bugs in various devices.
The Wounding Hack
A very harmful bug has been discovered in many iPhone models. This was found out by a researcher who uses the personal nickname ‘axi0mX’.
This has been turning heads of so many users as it has been affecting hundreds of iPhones and the hack is so much sturdy that it is found to be unfixable.
Not only iPhones but also iPods and iPads. The researcher ‘ami0mX’ has to describe this hack as ‘a permanent and unmatchable bottom (known as ‘SecureROM’ by Apple).
What does this mean? This means that the hackers to introduce this flaw will be able to get the code and they will be able to load the firmware, the core of the OS, potentially onto an iPhone.
As a result, they will have the power to control the device any way of being distant from the device itself.
They will be able to do whatever they would want to do in the devices with the addition of some extra vulnerabilities.
The researcher published the code on Github that actually encouraged the jailbreak enthusiast for making use of the bug on almost all the generations of iPhones, iPads, and iPods.
How Far did it Spread?
The iPhone models that are actually are available to get affected by this hack are beginning from iPhone 4S (A5 chip) to iPhone 8 and iPhone X (A11 chip).
But, the hackers who carry the motive to mess with Apple users should not be having an easy time in order to mess with the hack.
This is because of the only one reason and that is this bug, hack, or flaw, whatever you call it, can only be set off over USB and it needs physical access to the device that the hackers have set their target on.
This mess has been on the field for the last couple of months this year. Now, what can be worse?
Well, there is something worse than this to happen in the month of August. By accident, apple introduced an old bug along with the introduction of iOS 12.4.
But, fortunately, Apple managed to get rid of this after it received thousands of complaints from users.
A View from a Professional Jailbreaker
The jailbreak that we are talking about in this article actually brought a lot of excitement in one of the subcultures of the security community, as it is already mentioned in the introductory section of this article.
There are some more tricks that can be used in order to jailbreak an iPhone model. ‘Exploit chain’ is something with which a hacker is able to take control of an iPhone in various techniques.
This is something that makes Apple itself to remove all the control over the iPhone. The hackers will have complete access and dominance over the phone.
They will also be able to insert any software they want to introduce in the device even staying away from the device.
Getting the same updates and security defense might not be possible to obtain by them that Apple always gives a general user.
Luca Todesco is one of the biggest and one of the most popular jailbreakers. He said that he had looked at the maneuver and also said that a jailbreak that was about to be taking place was likely.
He also made the confirmation about the fact that the most recent exposure of iOS could not be able to be fixed.
Over an encrypted messenger Luca Todesco made this following – “A full jailbreak requires some extra work in patches. … although it’s not hard. The hard part was being able to load patched firmware, which you now can.”
He also said that the jailbreak that took place and messed with the iPhones and iPads is not the actual jailbreak but the initial bug can be made bigger and it can transform into a full jailbreak.
The Biggest Happening
This news is considered to be the biggest event to take place in the field of vulnerabilities in the iOS world in many years. AxiomX, who is another researcher, made this statement.
He also came up with his own exploit for free in order to provide benefit to the iOS jailbreak and to the security research community.
During the time of publication, Apple did not give any sort of response to a request for comment.
Let’s Wrap Up
So, this was all about the flaw I had to share with you. Hopefully, you got to figure what kind of problem it has been creating in the Apple community. You can always reach out to the professionals of the iPhone Repair Dubai to fix all your iPhone bugs.
You can say whatever you want to in the comment section provided below. Also, do not forget to share this article and make more Apple users aware of this ‘unfixable’ flaw.