The data encrypted in your iPhone, iPad, or iPod touch devices are protected with a passcode and if the invalid passcode entered for 10 times, then the Operating system wipe’s all data from the phone.
Hickey Explained ZDnet that when an iPhone or iPad is plugged in and if the hackers send keyboard inputs it would trigger an interrupt request that takes priority than any other request on the device.
He posted a video explaining how the attack works, the demonstration starts with an iPhone or iPad plugged in, with the device plugged in attackers can send keyboard inputs for entering passcode instead of tapping the device screen.
Apple IOS <= 12 Erase Data bypass, tested heavily with iOS11, brute force 4/6digit PIN’s without limits (complex passwords YMMV) https://t.co/1wBZOEsBJl – demo of the exploit in action.
— Hacker Fantastic (@hackerfantastic) June 22, 2018
When the input received from the keyboard it would trigger an interrupt request that take’s priority than anything else happening in the device. If the attacker triggers a brute-force attack in one long string of inputs, it’ll process all of them, and bypass the erase data feature,” Hickey explained.
Hickey reported to Apple about his findings, Apple spokesperson Michele Wyman said Saturday that “The recent report about a passcode bypass on iPhone was in error and a result of incorrect testing.”
He later tweeted “the pins don’t always go to the SEP in some instances, so although it “looks” like pins are being tested they aren’t always sent and so they don’t count, the devices register fewer counts than visible.
It seems @i0n1c maybe right, the pins don’t always goto the SEP in some instances (due to pocket dialing / overly fast inputs) so although it “looks” like pins are being tested they aren’t always sent and so they don’t count, the devices register less counts than visible @Apple
— Hacker Fantastic (@hackerfantastic) June 23, 2018