Hackers and hacks News

The GreyKey Is An Expensive Device That Can Crack Any iPhone

A security company named Grayshift has created a device that hacks any iPhone device on the market. It comes with two lightning cables, permitting the users to unlock two Apple devices in the same time. The device has the dimensions of a mini pc and is highly portable.

Depending on the password complexity, the cracking takes from a few hours to a few weeks time. After it is cracked, the passcode is displayed on the iPhone screen.

After the iPhone is cracked, the data is copied on the GreyKey and it can be accessed on a web interface.

The GreyKey costs $15.000 and permits the hacking of 300 devices with an internet connection, but for $30.000, you will benefit of unlimited attempts and offline support also.

Grayshift announcement:

“The offline model does require token-based two-factor authentication as a replacement for geofencing for ensuring security. However, as people often write passwords on stickies and put them on their monitors, it’s probably too much to hope that the token will be kept in a separate location when the GrayKey is not being used. Most likely, it will be stored nearby for easy access,”

While this device could be very useful to the authorities, it can be used for illegal activities on the wrong hands. For now, we don’t actually know what happens with the cracked phone, if it remains jailbreaked or if it can be accessed remotely.

The GreyKey Is An Expensive Device That Can Crack Any iPhone

For more information, read this article from the Malwarebytes blog.


An Xagent malware for macOS steals browser passwords, takes screenshots and grabs iPhone backups

The guys from Bitdefender have recently discovered an Xagent malware for macOS users, capable of stealing passwords, taking screenshots and stealing iPhone backups from the Apple computers.

Most likely, the malware is developed by the APT28 cybercrime group, but Bitdefender can’t be sure. The Malware contains some modules that can scan the computer for hardware and software configurations, find all the running processes and run malicious files. Also, it steals the passwords saved in the browser and takes desktop screenshots.

APT28 is the group that hacked the computers from the U.S. Democratic National Committee last year during the presidential election. For now, we don’t know how the malware spreads, but the best way to avoid it is to download software only from the Mac App Store or trusted sources.

Despite the fact that macOS is Unix-based and so, the user permissions are more restrictive, compared to Windows, hackers managed to create viruses and malware for Apple’s platform as well.