Maker of 'GrayKey' iPhone Unlocking Box Suffers 'Brief' Data Breach, Receives Money Demands

Grayshift, the company that makes the GrayKey iPhone unlocking boxes that have been sold to multiple law enforcement agencies across the United States, recently suffered a data breach that allowed hackers to access a small portion of the GrayKey code, reports VICE's Motherboard.

graykey1


Last week, unknown hackers leaked portions of the GrayKey code and demanded two bitcoin from Grayshift with the threat of additional data being leaked. According to Motherboard, the code in question "does not appear to be particularly sensitive," but Grayshift did confirm that a "brief" data leak had occurred.

Indeed, Grayshift told Motherboard in a statement "Due [to] a network misconfiguration at a customer site, a GrayKey unit's UI was exposed to the internet for a brief period of time earlier this month."

"During this time, someone accessed the HTML/Javascript that makes up our UI. No sensitive IP or data was exposed, as the GrayKey was being validation tested at the time. We have since implemented changes to help our customers prevent unauthorized access," the statement added.

Grayshift says that no sensitive IP or data was exposed, and Motherboard confirms that the leaked code appears to be related to the user interface that displays messages on the GrayKey, but it's clear that Grayshift security is not airtight, raising questions about what kind of data might be accessible to hackers.

The GrayKey is a small, portable gray box equipped with dual Lightning cables. An iPhone is plugged into one of the cables to install proprietary software that's able to guess the passcode to an iPhone in as little as a few hours to a few days, based on the strength of the passcode.

GrayKey, which is priced starting at $15,000, can crack the latest iPhones running modern versions of iOS, including iOS 11. While the box is designed to provide law enforcement officials with easy access to locked iPhones for criminal investigations, there have been fears that the GrayKey technology could fall into the wrong hands.

The box has been sold to multiple law enforcement agencies across the country, and the data breach that Grayshift suffered, however inconsequential, is not at all reassuring for those who are worried about the security of the GrayKey boxes. The underlying functionality that allows the GrayKey to crack iPhones could be discovered and replicated, and the GrayKey boxes themselves are said to download data from cracked iPhones, which could also be at risk in a data breach.

According to Motherboard, Grayshift has not paid the extortionists their two bitcoin fee, as the Bitcoin addresses provided have received no funds. An additional Bitcoin address promising to provide interested parties with GrayKey information has also not received funds.

Grayshift says that "changes" have been made to help customers prevent unauthorized access to GrayKey boxes in the future, but Motherboard discovered another exposed GrayKey device broadcasting similar code.

Using the computer search engine Shodan, Motherboard found a seemingly exposed GrayKey device, broadcasting similar chunks of code to the open internet.

"To brute force a complex alphanumeric passcode, upload a custom password dictionary. If a dictionary is not uploaded, GrayKey will not attempt to brute force custom alphanumeric passcodes," one section of the apparent device's code reads.

The technology used for the GrayKey will likely be outdated at some point through updates to the iOS operating system, but as far as we know now, it's still functional for even the latest versions of iOS and the newest iOS devices, including the iPhone X.

Those worried about GrayKey and similar technologies can implement stronger and more secure passcodes and passwords that are more difficult to guess through brute forcing to prevent these kinds of tools from working. A 6-digit numeric passcode, Apple's default, can be guessed in as little as 11 hours, but an 8-digit numeric code can take over a month, while a 10-digit numeric code can take years.

Security experts recommend alphanumeric passcodes that are at least seven characters long with numbers, upper and lowercase letters, and symbols included. The longer the password, the more secure it is from GrayKey-style guessing methods. For more information on Grayshift's data breach, check out Motherboard's full report.

Note: Due to the political nature of the discussion regarding this topic, the discussion thread is located in our Politics, Religion, Social Issues forum. All forum members and site visitors are welcome to read and follow the thread, but posting is limited to forum members with at least 100 posts.

Popular Stories

iPhone SE 4 Thumb 1

iPhone SE 4 With Apple's Own 5G Modem 'Confirmed' to Launch in March

Tuesday November 19, 2024 12:12 pm PST by
Barclays analyst Tom O'Malley and his colleagues recently traveled to Asia to meet with various electronics manufacturers and suppliers. In a research note this week, outlining key takeaways from the trip, the analysts said they have "confirmed" that a fourth-generation iPhone SE with an Apple-designed 5G modem is slated to launch towards the end of the first quarter next year. In line with previo...
airtag purple

AirTag 2 Rumored to Launch Next Year With These New Features

Sunday November 17, 2024 5:18 am PST by
Apple released the AirTag in April 2021, so it is now three over and a half years old. While the AirTag has not received any hardware updates since then, a new version of the item tracking accessory is rumored to be in development. Below, we recap rumors about a second-generation AirTag. Timing Apple is aiming to release a new AirTag in mid-2025, according to Bloomberg's Mark Gurman....
Magic Mouse Next to Keyboard

No, Apple CEO Tim Cook Didn't Say He Prefers Logitech's MX Master 3 Over the Magic Mouse

Sunday November 17, 2024 3:03 pm PST by
While the Logitech MX Master 3 is a terrific mouse for the Mac, reports claiming that Apple CEO Tim Cook prefers that mouse over the Magic Mouse are false. The Wall Street Journal last month published an interview with Cook, in which he said he uses every Apple product every day. Soon after, The Verge's Wes Davis attempted to replicate using every Apple product in a single day. During that...
Generic iOS 18 Feature Real Mock

Apple Releases iOS 18.1.1 and iPadOS 18.1.1 With Security Fixes

Tuesday November 19, 2024 10:10 am PST by
Apple today released iOS 18.1.1 and iPadOS 18.1.1, minor updates to the iOS 18 and iPadOS 18 operating systems that debuted earlier in September. iOS 18.1.1 and iPadOS 18.1.1 come three weeks after the launch of iOS 18.1. The new software can be downloaded on eligible iPhones and iPads over-the-air by going to Settings > General > Software Update. Apple has also released iOS 17.7.2 for...
at t turbo indicator iphone 16 pro max v0 8hrh7w5f3w1e1

AT&T Turbo Indicator Showing Up in iPhone Status Bar for Subscribers

Wednesday November 20, 2024 3:42 am PST by
AT&T has begun displaying "Turbo" in the iPhone carrier label for customers subscribed to its premium network prioritization service, according to reports on Reddit. The new indicator seems to have started appearing after users updated to iOS 18.1.1, but that could be just coincidence. Image credit: Reddit user No_Highlight7476 The Turbo feature provides enhanced network performance through ...
iPhone 17 Slim Feature Single Camera 1 Redux

'iPhone 17 Air' Rumored to Surpass iPhone 6 as Thinnest iPhone Ever

Monday November 18, 2024 1:07 pm PST by
In a research note with Hong Kong-based investment bank Haitong today, obtained by MacRumors, Apple analyst Jeff Pu said he agrees with a recent rumor claiming that the so-called "iPhone 17 Air" will be around 6mm thick. "We agreed with the recent chatter of an 6mm thickness ultra-slim design of the iPhone 17 Slim model," he wrote. If that measurement proves to be accurate, there would be ...
bug security vulnerability issue fix larry

Make Sure to Update: iOS 18.1.1 and macOS Sequoia 15.1.1 Fix Actively Exploited Vulnerabilities

Tuesday November 19, 2024 10:52 am PST by
The iOS 18.1.1, iPadOS 18.1.1, and macOS Sequoia 15.1.1 updates that Apple released today address JavaScriptCore and WebKit vulnerabilities that Apple says have been actively exploited on some devices. With the JavaScriptCore vulnerability, processing maliciously crafted web content could lead to arbitrary code execution. The WebKit vulnerability had the same issue with maliciously crafted...

Top Rated Comments

rictus007 Avatar
86 months ago
That’s exactly why the iPhone, et al... should not have a back door
Score: 78 Votes (Like | Disagree)
tooloud10 Avatar
86 months ago
This is far beyond irony or karma, this is exactly what we've been screaming the warnings about for years now about why backdoors are an incredibly bad idea.
Score: 47 Votes (Like | Disagree)
lkrupp Avatar
86 months ago
Oh, and this technology will be exclusive to law enforcement and will never get in the hands of bad actors. Right.
Score: 40 Votes (Like | Disagree)
Quu Avatar
86 months ago
This is exactly why Tim Cook said you shouldn't build back-doors into products. Hackers will get at those back-doors one way or another.
Score: 40 Votes (Like | Disagree)
HiRez Avatar
86 months ago
Sure, let's build a "secure" government back door into all customer data and communications, what could go wrong?
Score: 34 Votes (Like | Disagree)
charlesdayton Avatar
86 months ago
I just want Apple to fix this bug so the stupid boxes become expensive paperweights.

Users have a right to privacy.
Score: 27 Votes (Like | Disagree)