


Jailbreaking a mobile device can be attractive to researchers, average users and malicious actors. This discovery made headlines and caught the attention of many security researchers. The attackers we're tracking run a malicious website called checkraincom that aims to draw in users who are looking for checkra1n. Checkm8 can be exploited with an open-source tool called "ipwndfu" developed by Axi0mX. The campaign we'll cover in this post tries to capitalize off of checkra1n, a project that uses the checkm8 vulnerability to modify the bootrom and load a jailbroken image onto the iPhone. The vulnerability impacts all legacy models of the iPhone from the 4S through the X.

However, this site just prompts users to download a malicious profile which allows the attacker to conduct click-fraud.Ĭheckm8 is a vulnerability in the bootrom of some legacy iOS devices that allows users to control the boot process. Cisco Talos recently discovered a malicious actor using a fake website that claims to give iPhone users the ability to jailbreak their phones. IntroductionĪttackers are capitalizing on the recent discovery of a new vulnerability that exists across legacy iOS hardware.
