FBI Used Security Flaw Found by 'Professional Hackers' to Crack San Bernardino Shooter's iPhone

Rumors have suggested the FBI employed Israeli mobile forensics firm Cellebrite to hack into the iPhone 5c used by San Bernardino shooter Syed Farook, but new information from The Washington Post suggests it was instead done with the help of "professional hackers" at least one of which is a "gray hat" researcher that sells flaws to governments, black market groups, or companies that create surveillance tools.

According to sources who spoke to The Washington Post, the hackers told the FBI about a previously unknown software flaw, which was used to "create a piece of hardware" the FBI used to access the phone via its passcode. The hardware in question allowed the FBI to guess the passcode through multiple attempts without erasing the iPhone.

iphone5c

The new information was then used to create a piece of hardware that helped the FBI to crack the iPhone's four-digit personal identification number without triggering a security feature that would have erased all the data, the individuals said.

The researchers, who typically keep a low profile, specialize in hunting for vulnerabilities in software and then in some cases selling them to the U.S. government. They were paid a one-time flat fee for the solution.

The method the FBI allegedly used to break into the iPhone is similar in description to the tool that it had requested from Apple. Before finding an alternate way into the iPhone, the FBI had demanded Apple create a new version of iOS that would disable the passcode security features built into the operating system.

Apple was ordered to give the FBI software to disable the erase feature that would have wiped the iPhone after 10 incorrect guesses, eliminate the time added between entry attempts after the wrong passcode was entered, and create a way for the FBI to enter passcodes into the device electronically instead of manually.

The FBI did not need the services of Cellebrite "in this case," according to The Washington Post's sources, despite evidence the FBI signed a $15,000 contract with Cellebrite on March 21, the same day the Justice Department asked the court to postpone its imminent hearing with Apple. The tool acquired from the hackers did end up letting the FBI access the phone, leading the case against Apple to be dropped.

The U.S. government has not decided whether the method used to break into the iPhone will be shared with Apple, but FBI director James Comey has said the tool used to access the iPhone only works on a "narrow slice of phones" that does not include the iPhone 5s and later. Apple does not plan to sue to obtain the information.

Note: Due to the political nature of the discussion regarding this topic, the discussion thread is located in our Politics, Religion, Social Issues forum. All forum members and site visitors are welcome to read and follow the thread, but posting is limited to forum members with at least 100 posts.

Popular Stories

iPhone SE 4 Thumb 1

iPhone SE 4 With Apple's Own 5G Modem 'Confirmed' to Launch in March

Tuesday November 19, 2024 12:12 pm PST by
Barclays analyst Tom O'Malley and his colleagues recently traveled to Asia to meet with various electronics manufacturers and suppliers. In a research note this week, outlining key takeaways from the trip, the analysts said they have "confirmed" that a fourth-generation iPhone SE with an Apple-designed 5G modem is slated to launch towards the end of the first quarter next year. In line with previo...
airtag purple

AirTag 2 Rumored to Launch Next Year With These New Features

Sunday November 17, 2024 5:18 am PST by
Apple released the AirTag in April 2021, so it is now three over and a half years old. While the AirTag has not received any hardware updates since then, a new version of the item tracking accessory is rumored to be in development. Below, we recap rumors about a second-generation AirTag. Timing Apple is aiming to release a new AirTag in mid-2025, according to Bloomberg's Mark Gurman....
Magic Mouse Next to Keyboard

No, Apple CEO Tim Cook Didn't Say He Prefers Logitech's MX Master 3 Over the Magic Mouse

Sunday November 17, 2024 3:03 pm PST by
While the Logitech MX Master 3 is a terrific mouse for the Mac, reports claiming that Apple CEO Tim Cook prefers that mouse over the Magic Mouse are false. The Wall Street Journal last month published an interview with Cook, in which he said he uses every Apple product every day. Soon after, The Verge's Wes Davis attempted to replicate using every Apple product in a single day. During that...
Generic iOS 18 Feature Real Mock

Apple Releases iOS 18.1.1 and iPadOS 18.1.1 With Security Fixes

Tuesday November 19, 2024 10:10 am PST by
Apple today released iOS 18.1.1 and iPadOS 18.1.1, minor updates to the iOS 18 and iPadOS 18 operating systems that debuted earlier in September. iOS 18.1.1 and iPadOS 18.1.1 come three weeks after the launch of iOS 18.1. The new software can be downloaded on eligible iPhones and iPads over-the-air by going to Settings > General > Software Update. Apple has also released iOS 17.7.2 for...
iPhone 17 Slim Feature Single Camera 1 Redux

'iPhone 17 Air' Rumored to Surpass iPhone 6 as Thinnest iPhone Ever

Monday November 18, 2024 1:07 pm PST by
In a research note with Hong Kong-based investment bank Haitong today, obtained by MacRumors, Apple analyst Jeff Pu said he agrees with a recent rumor claiming that the so-called "iPhone 17 Air" will be around 6mm thick. "We agreed with the recent chatter of an 6mm thickness ultra-slim design of the iPhone 17 Slim model," he wrote. If that measurement proves to be accurate, there would be ...
bug security vulnerability issue fix larry

Make Sure to Update: iOS 18.1.1 and macOS Sequoia 15.1.1 Fix Actively Exploited Vulnerabilities

Tuesday November 19, 2024 10:52 am PST by
The iOS 18.1.1, iPadOS 18.1.1, and macOS Sequoia 15.1.1 updates that Apple released today address JavaScriptCore and WebKit vulnerabilities that Apple says have been actively exploited on some devices. With the JavaScriptCore vulnerability, processing maliciously crafted web content could lead to arbitrary code execution. The WebKit vulnerability had the same issue with maliciously crafted...
at t turbo indicator iphone 16 pro max v0 8hrh7w5f3w1e1

AT&T Turbo Indicator Showing Up in iPhone Status Bar for Subscribers

Wednesday November 20, 2024 3:42 am PST by
AT&T has begun displaying "Turbo" in the iPhone carrier label for customers subscribed to its premium network prioritization service, according to reports on Reddit. The new indicator seems to have started appearing after users updated to iOS 18.1.1, but that could be just coincidence. Image credit: Reddit user No_Highlight7476 The Turbo feature provides enhanced network performance through ...
New Things Your iPhone Can Do in iOS 18

18 New Things Your iPhone Can Do in iOS 18.2

Wednesday November 13, 2024 2:09 am PST by
Apple is set to release iOS 18.2 next month, bringing the second round of Apple Intelligence features to iPhone 15 Pro and iPhone 16 models. This update brings several major advancements to Apple's AI integration, including completely new image generation tools and a range of Visual Intelligence-based enhancements. There are a handful of new non-AI related feature controls incoming as well....

Top Rated Comments

aaronvan Avatar
112 months ago
FBI hacked the iPhone but they still can't decide what to do about Hillary's email server...
Score: 63 Votes (Like | Disagree)
Technarchy Avatar
112 months ago
Damage control story. FUD, psy-ops / counter ops misinformation.
Score: 19 Votes (Like | Disagree)
paradox00 Avatar
112 months ago
Exactly what Apple didn't want to happen happened.
Hardly. Apple can fix security flaws, they can't fix precedent. In court documents, Apple specifically stated that they didn't believe the FBI had exhausted all their efforts to hack the phone. This is proof Apple was right about that. Apple wanted the case to move forward (because they expected to win), but this is hardly the worst case scenario.
Score: 14 Votes (Like | Disagree)
vjl323 Avatar
112 months ago
Or they used PhoneView, an app for Mac that allows one to view contacts, messages, photos, call history, etc without typing in the passcode.
That's 100% untrue. I use PhoneView - it requires the phone to be unlocked just like iTunes in order to trust the computer it is attached to. You may not remember it, but when you first ran it, like iTunes, the phone prompted you, asking if you wish to trust the Mac/PC it is attached to.
Score: 9 Votes (Like | Disagree)
Nunyabinez Avatar
112 months ago
Damage control story and FUD, psy-ops / counter ops misinformation.
And a way to make Apple look bad. "Yeah, we got into the phone that Apple said was so secure that they couldn't get into unless they wrote new software, and we did it by exploiting a security flaw."
Score: 8 Votes (Like | Disagree)
CarlJ Avatar
112 months ago
The U.S. government has not decided ('https://www.macrumors.com/2016/04/05/fbi-iphone-data-still-under-analysis/') whether the method used to break into the iPhone will be shared with Apple, but FBI director James Comey has said the tool used to access the iPhone only works ('https://www.macrumors.com/2016/04/07/fbi-director-unlocking-iphone/') on a "narrow slice of phones" that does not include the iPhone 5s and later.
No no, the FBI swore up and down that this whole deal to have Apple create a special one-off version of iOS for them was JUST FOR THIS ONE PHONE, so I'm sure they'll be handing the exploit they used over to Apple, so that Apple can fix it to protect their customers from hackers. After all, the FBI wouldn't want to contribute to evil hackers breaking into citizen's phones.
Score: 8 Votes (Like | Disagree)