New Hack Unlocks 'Hundreds of Millions' of iPhones: What You Need to Know
But exploit requires special hardware and physical access
Here at Tom’s Guide our expert editors are committed to bringing you the best news, reviews and guides to help you stay informed and ahead of the curve!
You are now subscribed
Your newsletter sign-up was successful
Want to add more newsletters?
Daily (Mon-Sun)
Tom's Guide Daily
Sign up to get the latest updates on all of your favorite content! From cutting-edge tech news and the hottest streaming buzz to unbeatable deals on the best products and in-depth reviews, we’ve got you covered.
Weekly on Thursday
Tom's AI Guide
Be AI savvy with your weekly newsletter summing up all the biggest AI news you need to know. Plus, analysis from our AI editor and tips on how to use the latest AI tools!
Weekly on Friday
Tom's iGuide
Unlock the vast world of Apple news straight to your inbox. With coverage on everything from exciting product launches to essential software updates, this is your go-to source for the latest updates on all the best Apple content.
Weekly on Monday
Tom's Streaming Guide
Our weekly newsletter is expertly crafted to immerse you in the world of streaming. Stay updated on the latest releases and our top recommendations across your favorite streaming platforms.
Join the club
Get full access to premium articles, exclusive features and a growing list of member rewards.
The days of the "hack-proof" iPhone may be over.
A pseudonymous Twitter user called axi0mX posted a thread today (Sept. 27) introducing checkm8, a "permanent unpatchable bootrom exploit for hundreds of millions of iOS devices."
"Most generations of iPhones and iPads are vulnerable," axi0mX continued, "from iPhone 4S (A5 chip) to iPhone 8 and iPhone X (A11 chip). ... This is possibly the biggest news in [the] iOS jailbreak community in years."
MORE: Apple Issues Emergency Patch for iPhones and Macs: What to Do Now
But before you get excited, and before we get into the technical details, this is a deep-level software/hardware issue and requires special hardware and special software to exploit. There is no quick-and-easy hack or jailbreak related to this -- yet.
The bootrom is equivalent to the BIOS or UEFI firmware that starts up a PC, except that on a PC, that firmware can be updated. On an iPhone, it can't be, which does make this exploit a big deal.
Another iOS jailbreaker on Twitter, Morpheus______, responded to axi0mX's Twitter thread by saying that this is "not 'possibly the biggest' [news]. THE Biggest."
Get instant access to breaking news, the hottest reviews, great deals and helpful tips.
Morpheus______ followed up by explaining that "any iPhone 8/X or earlier can now be:
-- booted to any iOS version, past/present/future, with no SHSH/APTickets
-- booted to any OS (e.g. Android)
-- compromised by attacker w/physical access, but still requires password (or brute force)for private data."
Is my iPhone about to be hacked?
So do you need to worry that someone's going to hack your two-year-old iPhone? Not really. First of all, checkm8 requires physical access to an iOS device. The whole thing can be downloaded from GitHub, although axi0mX warns that it could brick your phone.
It also doesn't work on Apple's most recent systems-on-a-chip. Those would be the A12 Bionic, which powers the iPhone XS, XS Max and XR and the most recent iPad Mini and iPad Air, and the A13 Bionic, which is in the iPhone 11, 11 Pro and 11 Pro Max.
"What I am releasing today is not a full jailbreak with Cydia, just an exploit," said axi0mX. "Researchers and developers can use it to dump SecureROM, decrypt keybags with AES engine, and demote the device to enable JTAG. You still need additional hardware and software to use JTAG."
MORE: 10 Pros and Cons of Jailbreaking Your iPhone or iPad
In other words, you can use the checkm8 software to extract the bootrom code from an iPhone, if the phone is connected to a Mac or Linux machine via USB. The software will decrypt the secure data and unlock the device to provide JTAG access.
JTAG is a computer-industry standard for testing circuit boards, but some circuit boards require special connectors for physical JTAG access. It appears the various iPhone circuit boards may be among them.
"Maybe someone can figure out a nice way to use JTAG on iPhone without proprietary hardware and software," axi0mX wrote. "I and many others would be forever grateful if someone makes that possible."

Paul Wagenseil is a senior editor at Tom's Guide focused on security and privacy. He has also been a dishwasher, fry cook, long-haul driver, code monkey and video editor. He's been rooting around in the information-security space for more than 15 years at FoxNews.com, SecurityNewsDaily, TechNewsDaily and Tom's Guide, has presented talks at the ShmooCon, DerbyCon and BSides Las Vegas hacker conferences, shown up in random TV news spots and even moderated a panel discussion at the CEDIA home-technology conference. You can follow his rants on Twitter at @snd_wagenseil.
