Exploit

Pangu Team purportedly jailbreaks iPhone 13 Pro remotely at TianfuCup 2021

The Pangu Team is a name you might remember if you’ve been jailbreaking iPhones and iPads since ye olde days of iOS 9. Despite not releasing a public jailbreak since then, the Pangu Team continues to be hands-on with respect to iOS-related security research.

A wonderful example of that happened just this weekend in Chengdu, China at the TianfuCup (TFC) 2021, where the Pangu Team appears to be taking home the first-place prize in the contest by successfully pwning Apple’s brand-new iPhone 13 Pro running iOS 15 via a remote jailbreak. The earnings? A juicy $330,000 cash prize.

Hacker pattern_F_ goes hands-on with Saar Amar’s new kernel vulnerability, demos jailbreak on iOS 14.0

Security researcher Saar Amar on Monday published a proof of concept (PoC) of a kernel-level vulnerability dubbed CVE-2021-30883 that was patched by Apple’s iOS & iPadOS 15.0.2 software updates.

The write-up reignited hope that we’d see a jailbreak for recent iterations of Apple’s mobile operating systems, and perhaps unsurprisingly, some security researchers have already started going hands-on with it.

EntitlementFix: Another jailbreak tweak that patches at least 3 known 0-day exploits

It was only about a week after Apple released iOS & iPadOS 14.8 with patches for the zero-click exploits that were actively weaponized in the wild and by the Pegasus spyware that iOS developer Mario Cheung released a jailbreak tweak called FORCEDEXIT to address the issue on pwned handsets running affected firmware versions.

Today, Cheung seems to be at it again with a new and free jailbreak tweak dubbed EntitlementFix, which allegedly fixes three additional 0-day exploits known to impact jailbreakable versions of Apple’s mobile operating systems.

CoolStar teases jailbreak untether after achieving arbitrary code execution post-reboot

Matrix code hacked iPhone.

Untethered jailbreaks are something of a rarity these days, with most modern jailbreaks being either semi-tethered or semi-untethered variants instead. But a teaser by security researcher Linus Henze just one week ago manifested at least some hope that the community could witness one again soon, at least for the likes of iOS & iPadOS 14.5.1 and below.

And speaking of untethered jailbreaks, Odyssey Team lead developer CoolStar announced via the Sileo / Taurine / Odyssey Discord channel Monday evening that they had successfully achieved arbitrary code execution in a native iOS/iPadOS application after conducting a full reboot of the device. This is, of course, the hallmark feature of an untethered jailbreak.

Linus Henze demos untethered jailbreak on iPhone 12 Pro Max with iOS 14.5.1

For the past several years, the overwhelming majority of jailbreaks have been semi-untethered, meaning that you could still use a handset hacked liberated by said tools after a reboot, albeit in a non-jailbroken state.

The lack of untethered jailbreaks — or those that remain fully jailbroken following a reboot — has been a pain point for jailbreakers for as long as anyone can remember. For that reason, a Tweet shared by @LinusHenze Monday afternoon might be of particular interest…

Newly teased PoC raises hope for pwning certain handsets on iOS 14.4-14.5.1

The most current jailbreak tools available to the public today are Taurine and unc0ver, each of which are capable of jailbreaking devices running up to and including iOS or iPadOS 14.3. Several iPhone and iPad software updates later, and we’re currently residing at iOS & iPadOS 14.7.1 with a public iOS & iPadOS 15 release looming just over the horizon.

Having said that, the elephant in the room would be the blazingly-obvious question: where are all the jailbreak-viable exploits for iOS 14.4 and later?

Hacker 08Tc3wBB plans to present and publish a kernel exploit for M1-equipped Macs

Apple hasn’t held back from being vocal about the performance and security of its proprietary M1 chip – the tried-and-true powerhouse found inside of several different Mac computer models and even the highest-end 2021 iPad Pro. But as it would seem, not even the venerable M1 chip is hack proof…

Hacker and ZecOps security researcher @08Tc3wBB, known for contributions to the jailbreak community in the form of exploits that have been used in tools such as unc0ver by Pwn20wnd, appears to have made a momentous breakthrough with respect to the M1 chip.