A well-known hacker and cybersecurity researcher has demonstrated the existence of zero-day vulnerability in the beta version of the new Apple iOS 13 system. This beta version had just been released by Apple on Monday night, at the end of the WWDC 2019 start conference; in other words, the hacker took only twelve hours to find the flaw.
In its presentation, Apple revealed some of the most relevant novelties of this new operating system, such as the new night mode, which will also work for some company’s applications. As for the performance of the system, the company claims that with iOS 13 users will be able to unlock their devices with Face ID up to 30% faster than before, the execution of the applications and the energy consumption also improve in iOS 13.
The hacker, known as @iBSparkes on Twitter, released a video showing the target device, proving that it was running the beta firmware of Apple iOS 13, in addition to showing that it is using the system’s ‘Night Mode’.
After showing that the device is running iOS 13, the hacker launched an unknown application from the second home screen, which possibly contained the vulnerability proof of concept code; shortly after launching this application (possibly a self built), the device collapses, as the experts in cybersecurity reported.
Although for many people launching an application that generates flaws in the device is something very easy, someone with such hacking capabilities could use this knowledge about the operating system to open a whole new world of possibilities on iOS 13.
It remains to be seen how far the discoveries of this hacking expert can get about the latest version of Apple’s mobile operating system. However, cybersecurity specialists from the International Institute of Cyber Security (IICS) do not find much sense in the public disclosing of this zero-day vulnerability on iOS 13, as it is an incomplete version of the new operating system that will be released to the public until the fall of this year.
He is a well-known expert in mobile security and malware analysis. He studied Computer Science at NYU and started working as a cyber security analyst in 2003. He is actively working as an anti-malware expert. He also worked for security companies like Kaspersky Lab. His everyday job includes researching about new malware and cyber security incidents. Also he has deep level of knowledge in mobile security and mobile vulnerabilities.