Israeli security firm can unlock any iPhone on iOS 11.2.6 and below

IT security firm Cellebrite has just revealed that it can bypass security restrictions on all Apple devices. Here’s how their exploits work and what you can do to keep your device secure.

Cellebrite can hack into any Apple device

The infamous Israeli security research firm, Cellebrite claims that it can hack any iPhone in existence.

Other Apple devices like iPad, iPod, and even Android smartphones are also vulnerable.

A recent high-profile arms trafficking case involved the accused with an iPhone X. The United States Department of Homeland Security unlocked the smartphone to access sensitive information.

iOS hacker

This purportedly indicates that they used Cellebrite’s UFED technology and even the iPhone X is not safe from their exploits.

The hacking device they utilize requires complete physical access to the device. They just can’t hack into devices remotely with, for example, the SSH protocol.

For the uninitiated, the Israeli firm came into the limelight back in 2017. They helped FBI unlock the iPhone 5c of the San Bernardino shooter.

Can Apple block Cellebrite’s hacking tools?

As you already know, the entire Apple ecosystem uses state-of-the-art security techniques to deter hackers.

Unsurprisingly, a lot of their security patches are a direct consequence of public exploits.

Cellebrite keeps its technology and iOS exploits strictly under the wraps.

This is precisely what makes it difficult for Apple to deploy appropriate countermeasures – you can’t patch something you don’t know exists.


The best way to protect your iPhone against such threats is to use a complex passcode.

Although this doesn’t guarantee total safety, it will make it far more difficult for hackers to hack into your device.

Fortunately, Apple is moving away from USB access to the over-the-air approach – case in point, Apple TV 4K.

It wouldn’t surprise anyone if the upcoming Apple iPhone models go completely wireless.

How do you think can Apple block hackers from hacking into an iPhone? Leave your thoughts and opinions below.

For more security news and updates, like us on Facebook and Twitter.

One Response

  1. hector March 6, 2018

Leave a Reply

Share via
Copy link
Powered by Social Snap