Exploit

Pwn20wnd releases unc0ver v2.1.3 with bug fixes and improvements

Less than a week after launching unc0ver v2.1.1 to the general public, hacker and project lead developer Pwn20wnd has updated the iOS 11-centric jailbreak tool once again with bug fixes and improvements.

Pwn20wnd revealed the updated jailbreak tool Saturday morning via Twitter, adding that unc0ver v2.1.3 as an updated public release for all users rather than a beta intended for public testing:

Tihmstar opts not to release standalone exploit, instead says “something cool coming”

Matrix code hacked iPhone.

There was no shortage of exciting jailbreak-centric news this past week, but perhaps the most captivating tidbit of all was the announcement that tihmstar was tinkering with an exploit that could hack a subset of devices running iOS 11.2.6-11.4.1 – specifically those with headphone jacks.

It didn’t take long after the initial announcement for tihmstar to share that he had achieved tpf0, which permits arbitrary reads and writes to a device’s kernel memory. On the other hand, a pair of Tweets shared just weekend shed new light on the hacker’s intentions involving said exploit:

Pwn20wnd drops a fifth revision to the unc0ver v2.1.1 pre-release with more improvements

Hacker and unc0ver jailbreak tool lead developer Pwn20wnd pushed the fifth revision to the unc0ver v2.1.1 pre-release this weekend with another handful of bug fixes and improvements.

Citing Pwn20wnd’s official GitHub page, this is the fifth revision to the unc0ver v.2.1.1 pre-release since its conception one week ago. The latest revision brings the changes listed below:

Tihmstar achieves tfp0 exploit on iOS 11.4-11.4.1, jailbreaks could soon adopt support

Just yesterday, we reported that hacking guru tihmstar was tinkering with an exploit targeting a subset of iOS 11.4 and 11.4.1 devices that sported headphone jacks. At the time, tihmstar only had kernel read access but was still working on kernel offsets and write access.

But those tides have changed as of Friday. tihmstar has taken to Twitter to announce that he achieved tfp0:

Pwn20wnd pushes another revision to unc0ver v2.1.1 pre-release with bug fixes and improvements

Hacker and unc0ver lead developer Pwn20wnd dropped another small revision to the unc0ver v2.1.1 pre-release with additional bug fixes this week. The new revision comes four days after the initial v2.1.1 pre-release launched, and after several minor updates in between.

Citing Pwn20wnd’s official GitHub page, this is now the fourth revision to the unc0ver v.2.1.1 pre-release since its conception. The latest update encompasses these changes:

Tihmstar is tinkering with an exploit for iOS 11.4-11.4.1 devices, but there are caveats

If you’ve been waiting patiently on iOS 11.4-11.4.1 for a jailbreak to surface, then you might be in for a treat. Hacking guru tihmstar appears to be tinkering with an exploit that supports these firmware versions, at least on specific devices.

A Tweet shared by tihmstar Tuesday evening denotes how the exploit in question supports iOS versions up to 11.4.1; on the other hand, it also relies on the headphone jack. This caveat means that some devices, like those powered by Apple’s A10 and A11 chips, aren’t supported:

Pwn20wnd revises unc0ver v2.1.1 pre-release with bug fixes and improvements

After dropping the first unc0ver v2.1.1 pre-release earlier this week for public testing, hacker and lead developer Pwn20wnd issued a revised version of the unc0ver v2.1.1 pre-release Tuesday evening with more bug fixes and improvements.

Citing Pwn20wnd’s official GitHub page, this is now the third revision to the unc0ver v.2.1.1 pre-release since its conception. The latest update encompasses these changes:

S0rryMybad could release an iOS 12 exploit after Apple patches it in a software update

Matrix code hacked iPhone.

Apple first released iOS 12 in mid-September, and it’s seen a host of revisions over the last four months. Despite the continuous fortification of Apple’s mobile operating system, there’s been no shortage of bug and exploit reports encompassing iOS 12.

One of the latest announcements comes by way of security researcher @S0rryMybad, who appears to have happened upon a powerful exploit impacting iOS 12.1.2 and below on pre-A12 devices. But perhaps more importantly, the exploit can allegedly provide tfp0 on Apple’s latest mobile operating system:

Pwn20wnd launches unc0ver v2.1.1 pre-release for public testing

It was only a week ago that hacker Pwn20wnd launched unc0ver v2.1.0 to the public in one of the most substantial updates ever made to the modern jailbreak tool. But as it would seem, the hacker fancied taking things a step further.

Over the weekend, Pwn20wnd dropped the unc0ver v2.1.1 pre-release for public testing with a bevy of bug fixes and improvements. Citing Pwn20wnd’s official GitHub page, the new pre-release is comprised of the following changes:

PSA: There’s a fake iOS 12 jailbreak in the wild, stay away from it

While most of us are celebrating New Year’s Day the old-fashioned way, others are taking full advantage of the holiday to propagate nefarious activities. As it would seem, a fake iOS 12 jailbreak is being tossed around in the wild.

Hacker and unc0ver lead developer Pwn20wnd hopped on Twitter early Tuesday morning to dismiss any confusion concerning the new of the fake iOS 12 jailbreak:

Pwn20wnd updates the unc0ver v2.1.0 public release to ‘fix weird issues’

New Year’s Eve was a busy day for hacker and unc0ver lead-developer Pwn20wnd. Shortly after dropping the official public release of unc0ver v2.1.0, Pwn20wnd issued a quick revision for the jailbreak tool comprised of bug fixes.

Pwn20wnd announced the revision Monday evening via Twitter, noting that the contained fixes targeted “weird issues” being experienced by some users: