Affordable iPhone Cracker GrayKey Code Snippets Leak in Public – Extortionists Demand 2BTC

Author Photo
Apr 24, 2018
23Shares
Submit

You know what happens when governments say they need to break product security? Others also get to learn about those tools and techniques to use the same “backdoors.” Recently, GrayShift made quite some noise in the industry for offering law enforcement agencies around the United States cheap iPhone unlocking kits that enabled them to break into even the very latest iPhone running on the very latest iOS for under $100. [For context, the FBI had to pay millions of dollars to get a relatively weaker iPhone 5c unlocked in 2016]

The company sells a small 4-inch box called GrayKey that allows two iPhones to be connected at the same time. Going for as low as $15,000 for 300 uses, there is also a more “secure version” offered for $30,000 that doesn’t need any internet connection, is secured with 2FA, and has no limits on the number of unlocks.

iphone-xr-teardown-1Related Apple’s Irony Of Maintaining Build Quality Extends Beyond iPhone XR Troubles

But now this GrayKey tech appears to have been leaked – at least some portions of it

Someone has quietly leaked portions of GrayKey code onto the internet and is demanding from its maker $15,000 – exactly the amount of the base model – in ransom. If GrayShift doesn’t pay this ransom, the unknown party has threatened to release the more sensitive parts of the code.

Addressing a GrayShift co-founder, the leaker sent the following message (via Motherboard):

iphone-xr-4-2Related Apple Will Launch Three iPhones In 2019 With Brand New Antennas

“We are a ‘business group’ looking forward to bring into your attention the fact that we HAVE obtained the source code for your product GrayKey and would appreciate any donation above 2 BTC [~$19,000 on Tuesday],” a second message sent by the extortionist reads.

GrayShift appears to suggest that no sensitive data was leaked and that the code that has been made public comes from GrayKey’s UI. “Due [to] a network misconfiguration at a customer site, a GrayKey unit’s UI was exposed to the internet for a brief period of time earlier this month,” Grayshift told Motherboard.

“During this time, someone accessed the HTML/Javascript that makes up our UI. No sensitive IP or data was exposed, as the GrayKey was being validation tested at the time. We have since implemented changes to help our customers prevent unauthorized access.”

It is unclear if the extortionists really don’t have anything but the text from the UI, but they certainly haven’t yet received anything from GrayShift as the mentioned Bitcoin addresses remain empty.

– Thanks to GrayShift, 6-digit iPhone passcodes are no longer safe; here’s to how to stay secure

Submit