iOS 9.1 devices can be bypassed remotely

Just a month after iOS developers launched the new patch of iOS 9. Which they assures to the world is extremely secure, a group of hackers just bypassed its security to break into iOS 9.1 device.

This group of hackers also landed themselves $1 Million. Zerodium a security firm put up $1 Million bounty  for anyone last month who bypasses the Apple iOS 9.1 security remotely.

Zerodium took their twitter account to announce the winner but name of the hacking group or how they were able to bypass the Apple security is not disclosed. In an official tweet by Zerodium – “Our iOS #0day bounty has expired & we have one winning team who made a remote browser-based iOS 9.1/9.2b #jailbreak (untethered). Congrats!”

Bug bounties are the most talked about thing in the security world right now. With giants like Facebook, Google, Apple, Microsoft encouraging security researchers and hackers around the world to report Vulnerabilities and receive rewards according to the severity of it. 
Zeordium has no plans to report the vulnerability to the Apple Inc. Since the company is planning to sell the jailbreak to its major customers in industries like Defense, Finance & Technology. The founder of the company said in an interview to Wierd, where he explained how his company will sell the jailbreak to their U.S customers.  
“Bekrar confirmed that Zerodium plans to reveal the technical details of the technique to its customers, whom the company has described as “major corporations in defense, technology, and finance” seeking zero-day attack protection as well as “government organizations in need of specific and tailored cybersecurity capabilities.”
This is a big setback for the Apple Inc. Because the users are now more concerned about their security, because hackers are now more into target smartphones rather than computers. And with Android releasing its latest patch on Monday, which almost fixed all its vulnerabilities in Nexus phones. This is perhaps the worst time for the Apple Inc to receive a news like this. 
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...