Ian Beer

Developers use Ian Beer’s CVE-2025-24203 write-up to bring MacDirtyCow-like tweaks to newer firmware

MDC0 and dirtyZero apps.

In case you didn’t already know, there’s a new kernel exploit out in the wild that renowned Google Project Zero security researcher Ian Beer recently published a writeup about. CVE-2025-24203, which is being referred to by the iPhone & iPad hacking community as dirtyZero or mdc0, is a kernel exploit that allows for certain system customizations akin to what the MacDirtyCow exploit was once capable of on supported firmware.

Ian Beer publishes extensive write-up on FORCEDENTRY zero-click iMessage exploit used by NSO Group in Pegasus spyware

iPhone hacked matrix.

The iOS & iPadOS 14.8 update that Apple launched in mid-September was more than just a feature update. It also encompassed a fix for a considerably dangerous zero-click iMessage exploit dubbed FORCEDENTRY (CVE-2021-30860) that was being actively exploited by Israel’s NSO Group to target and surveil activists, journalists, and other high-profile occupations.

Ian Beer publishes PoC that could allow arbitrary code execution on iOS 14.4-14.5.1

Matrix code hacked iPhone.

Modern jailbreak tools like Taurine and unc0ver can currently jailbreak all iOS & iPadOS 14 devices running up to and including iOS & iPadOS 14.3. It’s been quite a while since any of these tools have picked up support for new firmware, but there’s always the very real possibility that these tools could add support for new firmware in the future.

Fortunately for those whose devices are operating on iOS or iPadOS 14.4 through 14.5.1, there just might be some hope. Renowned security researcher Ian Beer of Google Project Zero has just released documentation of what appears to be a kernel-level proof of concept (PoC) impacting up to and including iOS & iPadOS 14.5.1.

Ian Beer publishes details of kernel vulnerability for iOS 14.1 and lower

Matrix code hacked iPhone.

Ian Beer is a name much of the jailbreak community will recognize, and that’s because he’s a talented security researcher who discovered and published a plethora of different tfp0 exploits over the years — many of which went on to further jailbreak tool development.

Although Beer has been somewhat quiet these past several months, it seems it was for a good reason, as the hacker took to Twitter Thursday afternoon after publishing details for what appears to be a kernel vulnerability impacting iOS & iPadOS 14.1 and below.

Radio proximity security attack targeting up to iOS 13.5 detailed by Ian Beer

Matrix code hacked iPhone.

Accomplished security researcher Ian Beer, known for releasing a host of iOS exploits used by modern jailbreak tools, dropped a bombshell on Twitter late Wednesday evening after sharing a detailed blog post about a jaw-dropping radio proximity exploit affecting up to and including iOS and iPadOS 13.5.

The blog post summary goes on to explain that the hacker can remotely trigger kernel memory corruption through the execution of arbitrary code. Furthermore, it can force affected iOS and iPadOS devices in radio proximity to reboot with no user interaction needed or put privacy at risk by breaching user data or utilizing cameras and microphones without the user’s knowledge.  Scary indeed…

Pwn20wnd drops a fifth revision to the unc0ver v2.1.1 pre-release with more improvements

Hacker and unc0ver jailbreak tool lead developer Pwn20wnd pushed the fifth revision to the unc0ver v2.1.1 pre-release this weekend with another handful of bug fixes and improvements.

Citing Pwn20wnd’s official GitHub page, this is the fifth revision to the unc0ver v.2.1.1 pre-release since its conception one week ago. The latest revision brings the changes listed below:

Pwn20wnd pushes another revision to unc0ver v2.1.1 pre-release with bug fixes and improvements

Hacker and unc0ver lead developer Pwn20wnd dropped another small revision to the unc0ver v2.1.1 pre-release with additional bug fixes this week. The new revision comes four days after the initial v2.1.1 pre-release launched, and after several minor updates in between.

Citing Pwn20wnd’s official GitHub page, this is now the fourth revision to the unc0ver v.2.1.1 pre-release since its conception. The latest update encompasses these changes:

Pwn20wnd revises unc0ver v2.1.1 pre-release with bug fixes and improvements

After dropping the first unc0ver v2.1.1 pre-release earlier this week for public testing, hacker and lead developer Pwn20wnd issued a revised version of the unc0ver v2.1.1 pre-release Tuesday evening with more bug fixes and improvements.

Citing Pwn20wnd’s official GitHub page, this is now the third revision to the unc0ver v.2.1.1 pre-release since its conception. The latest update encompasses these changes: