FreeTheSandbox's profile picture. An official account for the #FreeTheSandbox Initiative that promote local admin rights for on *our* smartphones. 
It's simple: Local admin = more innovation!

#FreeTheSandbox

@FreeTheSandbox

An official account for the #FreeTheSandbox Initiative that promote local admin rights for on *our* smartphones. It's simple: Local admin = more innovation!

Fissato

A friendly reminder: hundreds of organizations develop, and sell / resell offensive cyber capabilities vs. smartphones. Oftentimes, zero-clicks. And yet, as of April 4th, 2021 - the sandbox developed by @Apple and @Google actively helps them to hide. It's time to #FreeTheSandbox


You may want to stay on 15.6 if you aim for full access to your device. This is unfortunate that we must keep the device in a vulnerable state to get a local admin on our phone... but this is the reality. Hopefully it will be fixed soon with #FreeTheSandbox

[IMPORTANT] Using an iPhone or iPad? make sure to update to the latest iOS and iPadOS that fixes two vulnerabilities that may have been exploited in the wild in one-click and potentially also zero-click attacks! More details on Apple's website: support.apple.com/en-us/HT213412

ZecOps's tweet image. [IMPORTANT] Using an iPhone or iPad? make sure to update to the latest iOS and iPadOS that fixes two vulnerabilities that may have been exploited in the wild in one-click and potentially also zero-click attacks!
More details on Apple's website: support.apple.com/en-us/HT213412


Repost di #FreeTheSandbox

Fake Droids: Your New Android Device is Actually an Old Android 6 via @ZecOps Blog blog.zecops.com/research/fake-…


Repost di #FreeTheSandbox

Surprise surprise! Another day another 0day exploited in the wild bleepingcomputer.com/news/security/… Incremental patches/mitigations will never work against determined individuals. The only thing that will help to reduce mass surveillance on mobile phones is more eyes. #FreeTheSandbox 👊


Repost di #FreeTheSandbox

[New Research] iOS Persistence without "Persistence": Meet The Ultimate Persistence Bug - #NoReboot via @ZecOps Blog blog.zecops.com/research/persi…


Remote + LPE on iOS 15.1 ? support.apple.com/en-us/HT212976


Repost di #FreeTheSandbox

iOS 15.2 is out and it is wild. Many remote and local security issues. If you care about your iPhone/iPad security you should update soon. [Source: support.apple.com/en-us/HT212976]

ihackbanme's tweet image. iOS 15.2 is out and it is wild. Many remote and local security issues. If you care about your iPhone/iPad security you should update soon.

[Source: support.apple.com/en-us/HT212976]

Repost di #FreeTheSandbox

How iOS Malware Can Spy on Users Silently? blog.zecops.com/research/how-i… via @ZecOps blog (POC included)


The day is coming. Consumers are waking up. Saying "no more" - you can't secure the platform 100% by definition - let us try too. #FreeTheSandbox #LocalAdminOnMobile #TheSpiceMustFlow

Mobile is a platform where attackers gets a better access than the victim trying to protect themselves, example #28241: Google Warns of New Android 0-Day Vulnerability Under Active Targeted Attacks thehackernews.com/2021/11/google…



<3 @ZecOps

[iOS 15.1 Update]: Use-After-Free in Voice Control: CVE-2021-30902 Write-up via @ZecOps Blog blog.zecops.com/research/use-a…



Repost di #FreeTheSandbox

Team PangU pwned iPhone13 Pro remote jailbreak on the day1 of TianfuCup, will take $300k as reward and ranked as #1 currently.

mj0011sec's tweet image. Team PangU pwned iPhone13 Pro remote jailbreak on the day1 of TianfuCup, will take $300k as reward and ranked as #1 currently.


Repost di #FreeTheSandbox

[BREAKING] CVE-2021-30858 iOS WebKit RCE 0-day in the wild: googleprojectzero.github.io/0days-in-the-w… including POC. Can be chained with CVE-2021-30883 and used in 1-clicks and water-holing attacks against iOS users. Update to the latest version as soon as possible.


Repost di #FreeTheSandbox

We can confirm that the recently patched iOS 15.0.2 vulnerability, CVE-2021-30883, is also accessible from the browser: perfect for 1-click & water-holing mobile attacks. This vulnerability is exploited in the wild. Update as soon as possible.

[BREAKING] @Apple just released iOS 15.0.2 and patched CVE-2021-30883, yet another vulnerability in IOMobileFrameBuffer, that was *exploited in the wild*. [ACTION REQUIRED] Update your iOS devices as soon as you can.

ZecOps's tweet image. [BREAKING] @Apple just released iOS 15.0.2 and patched CVE-2021-30883, yet another vulnerability in IOMobileFrameBuffer, that was *exploited in the wild*. 
[ACTION REQUIRED] Update your iOS devices as soon as you can.


The time has come 🥶. #FreeTheSandbox

Some technical details and POC of the IOMFB Integer (CVE-2021-30883) Overflow are already available by the fantastic @AmarSaar saaramar.github.io/IOMFB_integer_…



Repost di #FreeTheSandbox

This vulnerability is possibly related to: CVE-2021-30807, also in IOMobileFrameBuffer, that was patched in iOS 14.7.1. The vulnerability provides to attackers kernel privileges after they already gained initial code execution capabilities on the device.


Repost di #FreeTheSandbox

[BREAKING] @Apple just released iOS 15.0.2 and patched CVE-2021-30883, yet another vulnerability in IOMobileFrameBuffer, that was *exploited in the wild*. [ACTION REQUIRED] Update your iOS devices as soon as you can.

ZecOps's tweet image. [BREAKING] @Apple just released iOS 15.0.2 and patched CVE-2021-30883, yet another vulnerability in IOMobileFrameBuffer, that was *exploited in the wild*. 
[ACTION REQUIRED] Update your iOS devices as soon as you can.

Repost di #FreeTheSandbox

Tapping “trust” on idevices then entering recovery mode over wireless (which is an old iOS feature) is the new RCE.


Loading...

Something went wrong.


Something went wrong.