WARNING: January 1st 1970 Bug Can Be Used to Remotely Brick iPhones [Video]

WARNING: January 1st 1970 Bug Can Be Used to Remotely Brick iPhones [Video]

Posted by · 13408 views · Translate
Security researchers have discovered that the January 1st, 1970 bug can be used to remote brick iPhones and iPads.

Patrick Kelley and Matt Harrigan managed to automate the exploitation of the date bug that bricked many iPhones back in February, armed with only $120 of electronics, a basic understanding of networking, and a familiarity with the way Apple devices connect to wireless networks.

Using a custom Raspberry Pi setup built by Kelley, a wifi access point resembling a commonly trusted network spoofs Apple’s NTP servers to pass the 1/1/1970 date to the device. This starts a chain reaction of software instability resulting in a observed temperatures up to 54°C… which is hot enough to brick a device.

This issue has been fixed with the release of iOS 9.3.1. You can find download links for the new firmware here.

Take a look at the video below to see the attack in action...

Read More


joshWUa - April 13, 2016 at 11:47pm
Tried it on mine and nothing happened.
Kg - April 13, 2016 at 6:36pm
Would be interesting to load this up in an Apple Store. Most of the devices out of the box are on older firmware...
odedo1 - April 13, 2016 at 5:18pm
It was discussed so many times already why bring back old news?
Chris - April 13, 2016 at 5:53pm
Because now they've discovered that they can do it remotely, which is way worse than when they first discussed the bug.
Ban the Trolls - April 13, 2016 at 5:59pm
Because this isn't old news. This is different from the original vulnerability that you could do yourself by setting the time back. If you read the article correctly or anything in the video it said anyone with the knowledge and tools to pull this off can easily do it over a simple wifi network. Not everyone updates there phones or iPads in a timely manner. Spreading the word about this might help them and save them from morons trying to do this in public.
4 More Comments
Recent