What Is GrayKey? A Tool That Breaks iPhone Encryption and Passwords
Pinterest Whatsapp
Advertisement

Encryption is a boon to anyone using a digital device. The internet would be a dangerous place without encryption 5 Common Encryption Types and Why You Shouldn't Make Your Own 5 Common Encryption Types and Why You Shouldn't Make Your Own Is it a good idea roll your own encryption algorithm? Ever wonder what types of encryption are the most common? Let's find out. Read More , as would Wi-Fi access points and password-protected devices like iPhones.

However, the iPhone is no longer the bastion of security it once was. US law enforcement agencies are using a cheap tool to bypass iPhone encryption, drastically reducing privacy while damaging security.

Here’s a deeper look at the new GrayKey tool, what it does, why it’s dangerous, and why Apple is worried about it.

Apple vs. The FBI

Before we examine GrayKey, a little background context for iPhone encryption and attempts to crack it.

Remember the San Bernardino iPhone? After a terrorist attack in San Bernardino, the FBI took Apple to court. The FBI wanted Apple to create an encryption backdoor that would let them skirt the iPhone security of one of the deceased terrorists. Naturally, Apple refused, correctly asserting that once the backdoor was created, it would never be closed Why We Should Never Let the Government Break Encryption Why We Should Never Let the Government Break Encryption Living with terrorist means we face regular calls for a truly ridiculous notion: create government accessible encryption backdoors. But it's not practical. Here's why encryption is vital to day to day life. Read More .

The Israeli-based security firm, Cellebrite, eventually found a way through the Apple security mechanisms using a previously unknown vulnerability. And there was nothing of note on the phone. Also note that at the time, the Cellebrite service cost $5,000 per device and the phone had to be sent to their secure facility.

Flash forward to 2017. A company known as Grayshift appears on the market, selling their new product: GrayKey. The purpose of GrayKey was unclear until Thomas Fox-Brewster revealed the device in a Forbes Exclusive, including several pictures as well as an overview of exactly what the GrayKey iPhone unlocker does.

The GrayKey iPhone Unlocker

Here’s what is known about the GrayKey iPhone unlocker so far.

The GrayKey device itself is a small, gray box measuring four inches deep by two inches tall. The box comes with two Lightning cables sticking out the front for connecting two iPhones at a time.

GrayKey hacks Apple iPhones for law enforcement and security agencies

An iPhone connects to the GrayKey device for about two minutes, after which they are disconnected but not yet cracked. The actual cracking process time varies depending on the password strength.

An easy passcode takes around two hours to crack via brute-force, while more difficult passcodes (six digits) can take three days or longer. The GrayKey documentation, also seen by Malwarebytes, doesn’t mention cracking times for longer combinations.

When the crack finds the device passcode, the phone will display a black screen showing the code with other device information. (Tips for creating a strong and memorable password. How to Create a Strong Password That You Will Not Forget How to Create a Strong Password That You Will Not Forget Do you know how to create and remember a good password? Here are some tips and tricks to maintain strong, separate passwords for all of your online accounts. Read More )

GrayKey Downloads the Entire iPhone

The unlocker displays the device passcode, but it also downloads the entire iPhone file system to the GrayKey device. The GrayKey then connects to a web-based interface where it is available for analysis.

The image below shows the results of a cracked iPhone X. Note the “Found passcode,” the very recent “Software Version,” and the “iTunes Backup” and “Full Filesystem” available for download (including their SHA256 hash).

GrayKey Costs a Lot of Money

The GrayKey iPhone unlocker has two different versions.

The first model costs $15,000 and requires internet connectivity to work. In that, the device is geofenced to its initial setup network to make sure the GrayKey isn’t easily transferred. Other reports claim the persistent internet connection model also only allows 300 unlocks, working out at $50 per iPhone.

The second model costs $30,000 and works offline, with no apparent limit on the number of uses of the GrayKey device. The device will presumably work until Apple finally figures out the vulnerability and patches it.

Which Law Enforcement Agencies Have a GrayKey?

While these are undoubtedly huge sums of money, law enforcement agency budgets will easily (or miraculously, depending on the agency) stretch for a tool that creates an entirely new avenue of information. Especially one previously unobtainable for many agencies, at least in such an apparently easy capacity.

An ongoing Motherboard investigation found several different agency types had already bought a GrayKey:

  • Local police: The Miami-Dade County Police indicated that they might have purchased a GrayKey device.
  • Regional police: The Maryland State Police and Indiana State Police have issued procurement forms for GrayKey devices.
  • City police: Documents also indicate that the Indianapolis Metropolitan Police Department received a quote from Grayshift regarding GrayKey devices.
  • Secret Service: Emails show agency plans to purchase six GrayKey devices.
  • State Department: The Department of State’s Bureau of Diplomatic Security bought a $15,000 item from Grayshift in March 2018, according to public procurement records.
  • DEA: The Drug Enforcement Agency issued a Sources Sought document for an offline GrayKey device.
  • FBI: Online public procurement records show the FBI looking to buy six GrayKey devices.

If Grayshift’s GrayKey continues to provide authorities with previously unobtainable iPhone data, you are likely to see more agency procurement forms too.

What Is Apple Doing to Stop GrayKey?

As you might imagine, Apple is not best pleased with the iPhone’s security being so publicly breached. And not just old iPhone’s—we’re talking top of the range devices running some of the latest versions of iOS. Apple isn’t going to sit and wait for Grayshift to keep the vulnerability open.

Instead, in the current iOS 12 public beta, there is a new feature that drastically limits access to the Lightning port of a locked iPhone. (More features coming to your iPhone with iOS 12! What's New in iOS 12? 9 Changes and Features Coming in Fall 2018 What's New in iOS 12? 9 Changes and Features Coming in Fall 2018 iOS 12 is coming in late 2018. Learn about the exciting new features arriving soon on an iPhone or iPad near you. Read More )

“We’re constantly strengthening the security protections in every Apple product to help customers defend against hackers, identity thieves, and intrusions into their personal data,” an Apple spokesperson told Reuters. “We have the greatest respect for law enforcement, and we don’t design our security improvements to frustrate their efforts to do their jobs.”

iOS 12 will render Lightning port brute-force attacks useless by disabling access via that route after just one hour. The new USB Restricted Mode will stop any data communication from a newly connected device after that 60-minute period, effectively rendering the GrayKey useless. The current USB Restricted Mode settings have a time limit of one week, giving authorities a lengthy period to hopefully brute-force the password.

How Can You Protect Yourself Against GrayKey?

Given the incoming update to iOS 12 and the introduction of restrictions to USB Restricted Mode, there is only one thing you can do right now: update your passcodes. You should always use a minimum of eight digits to keep your phone secure. Alternatively, to truly bulk out your iPhone security, switch to a lengthier passphrase.

iOS supports custom numeric and custom alphanumeric codes of any length. A passphrase uses multiple words to create much stronger lock Why Passphrases Are Still Better than Passwords & Fingerprints Why Passphrases Are Still Better than Passwords & Fingerprints Remember when passwords didn't have to be complicated? When PINs were easy to remember? Those days are gone, and cybercrime risks mean fingerprint scanners are next to useless. It's time to start using passcodes... Read More than your regular PIN or password. Check out the extremely relevant XKCD comic for more information:

What is Apple doing about GrayKey encryption-hacking?

The Ongoing Gray Area of GrayKey

Right now, law enforcement agencies hold the cards. In a sense, at least. An iPhone with poor security is vulnerable. However, this situation might not last long, unless Grayshift keeps finding vulnerabilities and workarounds for Apple’s iPhone security patches. Furthermore, the GrayKey isn’t unprecedented.

The IP-Box was a similar device that could access the information of locked iPhones running older iOS versions. Its functionality ceased with the iOS 8.2 update but gave rise to the IP-Box 2. The IP-Box 2 is still widely available but requires knowledge of how to remove integrated circuit chips to place in the device.

There are other implications, too. Is the iPhone permanently vulnerable after the password cracking completes? Can the iPhone owner use their phone as normal again, or will it need to be replaced?

And finally, how should authorities decide when to use their GrayKey device? I mean, is there a defined protocol that governs device password cracking using a third-party tool? Do they need an affidavit, reasonable suspicion, and so on?

The ongoing implications and debate surrounding iPhone password cracking using a GrayKey device will continue. I’m sure the majority of readers expect law enforcement to do as much as they can to protect victims. If password cracking becomes a core tenet of civic security, do you trust the authorities to exercise that power at the right time?

And would you just increase the amount of encryption on your device 7 Reasons Why You Should Encrypt Your Smartphone Data 7 Reasons Why You Should Encrypt Your Smartphone Data Are you encrypting your device? All major smartphone operating systems offer device encryption, but should you use it? Here's why smartphone encryption is worthwhile, and won't affect the way you use your smartphone. Read More to counteract their efforts?

Explore more about: Encryption, iPhone, Smartphone Security.

Enjoyed this article? Stay informed by joining our newsletter!

Enter your Email

Leave a Reply

Your email address will not be published. Required fields are marked *

  1. Minix
    July 20, 2018 at 5:59 am

    This was fixed with an iOS update, now you have to enter passcode to connect an iPhone to any USB device.

    And if you are really concerned, you can still delete data with Find my phone.

  2. Bachsau
    July 4, 2018 at 12:24 pm

    People using four or six digits as their passcode are to blame themselves. With Touch ID and Face ID it's no problem to opt for a long alphanumeric code.

  3. Kiesp
    July 4, 2018 at 6:31 am

    Very wellwritten and interesting article. Maybe I should strengthen my password...

  4. dragonmouth
    July 3, 2018 at 11:01 pm

    Now that Grayshift has proven that Graykey is possible, it will be only months, if not weeks before the run of the mill hackers and crackers build their own copies. And that scares the s**t out of me.

    "I’m sure the majority of readers expect law enforcement to do as much as they can to protect victims."
    Next Joke!!! If the readers believe that then they are deluded fools.
    What victims are you talking about? Do you mean the ones whose devices get cracked by law enforcement and, like in the San Bernardino case, nothing of note is found?

    "If password cracking becomes a core tenet of civic security, do you trust the authorities to exercise that power at the right time?"
    NO!!! I trust the authirities to ride roughshod over all Constitutional guarantees in the name of "national security".

  5. ReadandShare
    July 3, 2018 at 8:32 pm

    "If password cracking becomes a core tenet of civic security, do you trust the authorities to exercise that power at the right time?"

    NO!