Site icon The IT Nerd

Grayshift Has iOS Spyware That Can Capture Your Passcode….. But There’s A Catch

Advertisements

If you’ve been following this blog for a while, you’re likely aware of Grayshift which is a company that makes iPhone cracking tools for law enforcement. Now the catch with any of these sorts of tools is that they brut force the passcode to get into the iPhone in question. That’s great if you are dealing with a 4 digit passcode which would take minutes to crack, or a six digit one which would take hours. But if you’re dealing with an alphanumeric passcode, that may be next to impossible to crack. So, for those scenarios where the passcode is difficult to crack, Grayshift has another approach that was previously unknown to the public:

Software called Hide UI, created by Grayshift, a company that makes iPhone-cracking devices for law enforcement, can track a suspect’s passcode when it’s entered into a phone, according to two people in law enforcement, who asked not to be named out of fear of violating non-disclosure agreements.

The spyware, a term for software that surreptitiously tracks users, has been available for about a year but this is the first time details of its existence have been reported, in part because of the non-disclosure agreements police departments sign when they buy a device from Grayshift known as GrayKey.

Those NDAs have helped keep Hide UI a secret. Because of the lack of public scrutiny of the feature as well as its covert behavior, defense attorneys, forensic experts and civil liberties advocates are concerned that Hide UI could be used without giving owners the due process of law, such as a warrant.

So the use of this software would go something like this:

In order for this feature to work, law enforcement officials must install the covert software and then set up a scenario to put a seized device back into the hands of the suspect, said the people familiar with the system, who did not wish to be identified for fear of violating their NDA with Grayshift and having access to the device revoked.

For example, a law enforcement official could tell the suspect they can call their lawyer or take some phone numbers off the device. Once the suspect has done this, even if they lock their phone again, Hide UI will have stored the passcode in a text file that can be extracted the next time the phone is plugged into the GrayKey device. Law enforcement can then use the passcode to unlock the phone and extract all the data stored on it.

Well, the suspect would have to be pretty dumb to fall for this. Especially now that the existence of this spyware is out there. And you have to wonder how legal this method of grabbing data off an iPhone is. But I am a computer nerd and not a lawyer. One thing is for sure, now that this is out there, you can bet that Apple will try to devise countermeasures to this so that whatever success this tool has in terms of helping to get into iPhones is short lived.

Exit mobile version