Apple iOS 6.1 Lockscreen Bug Exposes iPhones to Hacking [Video]

The iPhone lock screen can’t be considered as an ultimate means of protection against hackers, reports claim.

The device’s lock screen can be bypassed because of a security flaw that renders the device accessible to hackers.

A four-digit security pin code which is believed to prevent unauthorised users from accessing iPhones can be bypassed by anyone, it was revealed today.

Aborting an emergency call and then following easy steps any hacker can reach the iPhone’s email, contacts, text messages, voice mail and even video calling in version 6.1 of Apple’s iOS software.

Techcrunch, a gadget blog, called the exploit “a massive backdoor to some of the iPhone’s core functions”.

A YouTube user who undentified himself only as videosdebarraquito shows off a sequence of steps to stole information from the Apple’s product running iOS 6.1 in under a minute.

Following the given instructions The Verge successfully performed the hack on two iPhone 5s in the U.K. and the original hack seems to have been performed on an iPhone 5 in Spain.

Reached for comment by The Huffington Post, an Apple spokesperson added, “Apple takes user security very seriously. We are aware of this issue, and will deliver a fix in a future software update.”

This is not the first time when Apple problems of this kind while the Californian tech giant has previously considered to be immune to security problems that plagued PCs.

In 2009 the iPhone maker patched a problem that meant a series of text messages could trigger a remote takeover of a user’s handset.

Charlie Miller, a security adviser with Independent Security Evaluators, warned at the time that these messages probably contained a special code for an executable file that would then embed itself in the iPhone’s memory, and provides an access to hacker.

Two years ago, Germany’s IT security agency warned that Apple’s operating system that runs some series of its products – had a ‘critical weakness’ that would allow hackers to run malicious code.

Basically, after jailbreaking the device, German researchers simply targeted Apple’s password management system, keychain, to get a huge cache of sensitive information.

Jailbreaking is believed to be the most common method among those who want to bypass Apple’s restrictions on outside software. In this hack, unlike the current method, however,  the researchers were then able to install software that rendered passwords in the keychain vulnerable.

“As soon as attackers are in the possession of an iPhone or iPad and have removed the device’s SIM card, they can get a hold of e-mail passwords and access codes to corporate VPNs and WLANs as well,” the researchers said in a statement at the time.

“Control of an e-mail account allows the attacker to acquire even more additional passwords: For many web services such as social networks the attacker only has to request a password reset. Once the respective service returns the new password to the user’s e-mail account, the attacker has it as well.”

Should the revealed new bug prove to be a widespread problem, the Cupertino company is expected to issue a patch. Either way, it seems the safest way to protect your data is to never misplace your phone in the first place.

Share This article

We welcome comments that advance the story directly or with relevant tangential information. We try to block comments that use offensive language, all capital letters or appear to be spam, and we review comments frequently to ensure they meet our standards. If you see a comment that you believe is irrelevant or inappropriate, you can flag it to our editors by using the report abuse links. Views expressed in the comments do not represent those of Coinspeaker Ltd.