Ian Beer

Ian Beer publishes extensive write-up on FORCEDENTRY zero-click iMessage exploit used by NSO Group in Pegasus spyware

iPhone hacked matrix.

The iOS & iPadOS 14.8 update that Apple launched in mid-September was more than just a feature update. It also encompassed a fix for a considerably dangerous zero-click iMessage exploit dubbed FORCEDENTRY (CVE-2021-30860) that was being actively exploited by Israel’s NSO Group to target and surveil activists, journalists, and other high-profile occupations.

Ian Beer publishes PoC that could allow arbitrary code execution on iOS 14.4-14.5.1

Matrix code hacked iPhone.

Modern jailbreak tools like Taurine and unc0ver can currently jailbreak all iOS & iPadOS 14 devices running up to and including iOS & iPadOS 14.3. It’s been quite a while since any of these tools have picked up support for new firmware, but there’s always the very real possibility that these tools could add support for new firmware in the future.

Fortunately for those whose devices are operating on iOS or iPadOS 14.4 through 14.5.1, there just might be some hope. Renowned security researcher Ian Beer of Google Project Zero has just released documentation of what appears to be a kernel-level proof of concept (PoC) impacting up to and including iOS & iPadOS 14.5.1.

Ian Beer publishes details of kernel vulnerability for iOS 14.1 and lower

Matrix code hacked iPhone.

Ian Beer is a name much of the jailbreak community will recognize, and that’s because he’s a talented security researcher who discovered and published a plethora of different tfp0 exploits over the years — many of which went on to further jailbreak tool development.

Although Beer has been somewhat quiet these past several months, it seems it was for a good reason, as the hacker took to Twitter Thursday afternoon after publishing details for what appears to be a kernel vulnerability impacting iOS & iPadOS 14.1 and below.

Radio proximity security attack targeting up to iOS 13.5 detailed by Ian Beer

Matrix code hacked iPhone.

Accomplished security researcher Ian Beer, known for releasing a host of iOS exploits used by modern jailbreak tools, dropped a bombshell on Twitter late Wednesday evening after sharing a detailed blog post about a jaw-dropping radio proximity exploit affecting up to and including iOS and iPadOS 13.5.

The blog post summary goes on to explain that the hacker can remotely trigger kernel memory corruption through the execution of arbitrary code. Furthermore, it can force affected iOS and iPadOS devices in radio proximity to reboot with no user interaction needed or put privacy at risk by breaching user data or utilizing cameras and microphones without the user’s knowledge.  Scary indeed…

Pwn20wnd drops a fifth revision to the unc0ver v2.1.1 pre-release with more improvements

Hacker and unc0ver jailbreak tool lead developer Pwn20wnd pushed the fifth revision to the unc0ver v2.1.1 pre-release this weekend with another handful of bug fixes and improvements.

Citing Pwn20wnd’s official GitHub page, this is the fifth revision to the unc0ver v.2.1.1 pre-release since its conception one week ago. The latest revision brings the changes listed below:

Pwn20wnd pushes another revision to unc0ver v2.1.1 pre-release with bug fixes and improvements

Hacker and unc0ver lead developer Pwn20wnd dropped another small revision to the unc0ver v2.1.1 pre-release with additional bug fixes this week. The new revision comes four days after the initial v2.1.1 pre-release launched, and after several minor updates in between.

Citing Pwn20wnd’s official GitHub page, this is now the fourth revision to the unc0ver v.2.1.1 pre-release since its conception. The latest update encompasses these changes:

Pwn20wnd revises unc0ver v2.1.1 pre-release with bug fixes and improvements

After dropping the first unc0ver v2.1.1 pre-release earlier this week for public testing, hacker and lead developer Pwn20wnd issued a revised version of the unc0ver v2.1.1 pre-release Tuesday evening with more bug fixes and improvements.

Citing Pwn20wnd’s official GitHub page, this is now the third revision to the unc0ver v.2.1.1 pre-release since its conception. The latest update encompasses these changes:

Pwn20wnd launches unc0ver v2.1.1 pre-release for public testing

It was only a week ago that hacker Pwn20wnd launched unc0ver v2.1.0 to the public in one of the most substantial updates ever made to the modern jailbreak tool. But as it would seem, the hacker fancied taking things a step further.

Over the weekend, Pwn20wnd dropped the unc0ver v2.1.1 pre-release for public testing with a bevy of bug fixes and improvements. Citing Pwn20wnd’s official GitHub page, the new pre-release is comprised of the following changes:

Pwn20wnd updates the unc0ver v2.1.0 public release to ‘fix weird issues’

New Year’s Eve was a busy day for hacker and unc0ver lead-developer Pwn20wnd. Shortly after dropping the official public release of unc0ver v2.1.0, Pwn20wnd issued a quick revision for the jailbreak tool comprised of bug fixes.

Pwn20wnd announced the revision Monday evening via Twitter, noting that the contained fixes targeted “weird issues” being experienced by some users: