Exploit

Hacker 08Tc3wBB plans to present and publish a kernel exploit for M1-equipped Macs

Apple hasn’t held back from being vocal about the performance and security of its proprietary M1 chip – the tried-and-true powerhouse found inside of several different Mac computer models and even the highest-end 2021 iPad Pro. But as it would seem, not even the venerable M1 chip is hack proof…

Hacker and ZecOps security researcher @08Tc3wBB, known for contributions to the jailbreak community in the form of exploits that have been used in tools such as unc0ver by Pwn20wnd, appears to have made a momentous breakthrough with respect to the M1 chip.

Ian Beer publishes PoC that could allow arbitrary code execution on iOS 14.4-14.5.1

Modern jailbreak tools like Taurine and unc0ver can currently jailbreak all iOS & iPadOS 14 devices running up to and including iOS & iPadOS 14.3. It’s been quite a while since any of these tools have picked up support for new firmware, but there’s always the very real possibility that these tools could add support for new firmware in the future.

Fortunately for those whose devices are operating on iOS or iPadOS 14.4 through 14.5.1, there just might be some hope. Renowned security researcher Ian Beer of Google Project Zero has just released documentation of what appears to be a kernel-level proof of concept (PoC) impacting up to and including iOS & iPadOS 14.5.1.

Arbitrary code execution achieved on iOS 14.5.1 and below, write-up purportedly coming at a later date

Apple just yesterday released iOS & iPadOS 14.6 to the general public to lay the groundwork for Apple Music’s upcoming lossless playback option, support Apple Card Family, and more. But that's not all...

Also worth noting is that iOS & iPadOS 14.6 patched a number of security vulnerabilities, including one that purportedly allowed security researcher @xerub to gain arbitrary code execution by simply parsing a carefully crafted certificate.

Apple’s brand new AirTag has already been hacked

Apple announced its new AirTag tracking accessory at the Spring Loaded event just over two weeks ago, and the first deliveries only started reaching the hands of avid customers last weekend.

Despite how new the product is, it seems that it has already been hacked by brilliant minds in the security research space.

CoolStar pwns Apple Watch with the cicuta_verosa exploit

The quest to pwn the Apple Watch is one that has received oodles of attention over the years, and while the concept is most certainly possible, it hasn’t quite reached the level of fruition that most jailbreakers would expect – especially when compared with the jailbreak offerings for iPhones and iPads.

Much of this has to do with the uncertainty of an Apple Watch jailbreak’s usefulness in addition to concerns related to restoring the Apple Watch’s firmware in the event of catastrophic errors (respring loops, etc.), but that hasn’t stopped some jailbreak developers from dabbling with the idea.

Unc0ver jailbreak updated to v6.1.2 with several bug fixes and notable new features

Pwn20wnd’s unc0ver jailbreak was the first semi-untethered tool to add support for iOS & iPadOS 14.0-14.3 back in February, but recent attention shifted to the Odyssey Team’s Taurine jailbreak for iOS & iPadOS 14.0-14.3 given that it just launched last week.

Still, that hasn’t stopped Pwn20wnd from cranking out regular revisions to unc0ver. Just this evening, the unc0ver jailbreak received an update to version 6.1.2 with a number of new stability improvements and a shiny new safety feature that jailbreakers may find helpful.

Auto-executing ap0110 jailbreak for 32 & 64-bit iOS 10 devices now available

The jailbreak community has been on fire lately. Not only have all iOS & iPadOS 14.0-14.3 devices been made pwnable by both the tried and true unc0ver and brand new Taurine jailbreak tools, but the recent release of the kok3shi jailbreak made it possible for users of 64-bit iOS 9.3-9.3.5 devices to pwn their handsets as well.

Now, it seems a little more love is being provided for iOS 10 users as the Athenus Dev Team and w212 have teamed up to release ap0110, an auto-executing semi-untethered jailbreak for 32 and 64-bit iOS 10.x devices.

How to install the Taurine jailbreak on iOS or iPadOS 14.0-14.3 via AltStore

In case you’ve been living under a rock, the Taurine jailbreak is now officially available for all iOS & iPadOS 14.0-14.3 devices.

Taurine is the latest jailbreak whose development is led by CoolStar, the same individual responsible for spearheading the development of the Odyssey jailbreak on iOS & iPadOS 13.0-13.7 devices, the Chimera jailbreak on iOS 12 devices, and the Electra jailbreak on iOS 11 devices. With that in mind, if you've used any of the aforementioned jailbreak tools in the past, then you will find that Taurine's user experience feels particularly similar.

CoolStar announces upcoming Taurine jailbreak for iOS & iPadOS 14.0-14.3

Ever since @ModernPwner dropped the cicuta_verosa kernel exploit for iOS & iPadOS 14.0-14.3 devices, we knew it’d only be a matter of time before jailbreaks would pick up support.

Pwn20wnd was the first to the party after adding iOS & iPadOS 14.0-14.3 support to the unc0ver jailbreak with a custom kernel exploit based on cicuta_verosa, but it just so happens that CoolStar was also working on an iOS 14.0-14.3 jailbreak that uses the cicuta_verosa kernel exploit directly.