First of all, we should explain the end-to-end encryption. Backdoor is used by Whatsap p, Telegram, and a few more apps. Some say it is a severe mistake, while others claim it is an additional feature.Īnyway, it allows to you to hack Whatsapp and to read, by intercepting the messages between users. This method is perhaps the most appealing of them all. In plain words, Whatsapp doesn’t realize what has been actually received until it is too late. However, the opening is the first step here and only then a message is validated. It means that an app won’t be aware of the message or a file which is sent to a device until it validates it. Telegram, Whatsapp, and a few other apps use the same type of encryption. A bit more detailed explanation is required here. In other words, the app will literally allow access of malware into a device. It directly allows to the users to open, view and store a photo or a video. In essence, Whatsapp doesn’t check the files for malware. ![]() The same applies to videos and documents, by the way. The explanation lies in the process how both of these apps treat media files. Within a matter of seconds, you can have a complete control over Whatsapp or Telegram, depending on which app you targeted. Once a user opens that photo, the code will infect the device, allowing you a complete access. Apple has been made aware of the issue, but until it releases a proper fix, users are advised not to access iCloud services over public Wi-Fi networks.In order to complete it, you will have to insert a malicious code into a photo. The pair say more details are coming Thursday hehe □ carrier fix is coming to ::)Īs malicious as the hack is, the two say their only goal was to alert iPhone and iPad users to how unsafe iCloud is. But according to one of the team members, a carrier fix is on the way. It appears that even after a successful attack, where an iPhone disabled by Activation Lock is un-bricked, the device is still SIM-locked. This is gaining traction with media but it only turns iPhones into iPods (no cell) and isn’t persist thru restores We haven’t seen video proof of the attack in action, but the hackers have demonstrated its efficiency by sharing screenshots of ‘calls to Apple’s iCloud activation service.’ A number of other users are also sharing screenshots, showing the hack worked for them.Įvad3rs team member and long-time hacker MuscleNerd notes: ![]() ![]() So, why would you use it? For example, if you have forgotten your Apple ID and password or no longer have access to your old itunes-email account then its impossible to regain control of your Apple Product!! doulCi is the solution that will enable you to can regain permenant access. doulCi will bypass and activate you iDevice for you when you are stuck at the Apple activation menu. Here’s how AquaXetine and MerrukTechnolog, aka Team doulCi (iCloud backwards), describe the attack:ĭoulCi is the worlds first Alternative iCloud Server, and the world’s first iCloud Activation Bypass. Apple recently fixed a similar vulnerability in OS X and iOS. And apparently, all you have to do to get it to work is plug in the device to a computer, and alter a file, directing it to an alternate server instead of iCloud…Īccording to security researcher Mark Loman, the bug in the Windows version of iTunes was either a beginner’s mistake, or was left in intentionally to allow intelligence agencies to access iCloud. ![]() The hack utilizes a vulnerability in iTunes for Windows that has to do with verifying security certificates. Two hackers have created a tool that they claim can bypass Apple’s ‘Activation Lock.’ It’s called ‘doulCi, and it uses a man-in-the-middle attack to intercept users’ Apple ID credentials as well as unlock devices disabled by the highly-lauded security feature.
0 Comments
Leave a Reply. |