Skip to content

Davey Winder

delivering award-winning technology journalism since 1991

  • home
  • about me
  • follow me on mastodon
  • privacy policy
  • Toggle search form
Photo of iOS devices side by side

The worrying case of the Su-A-Cyder sandjack attack

Posted on June 12, 2016June 12, 2016 By Davey Winder

Inside the tale of the iOS app vulnerability that Apple knows about but hasn’t patched yet. Are you sitting comfortably?

Once upon a time there was a gallant researcher who found a vulnerability with iOS devices, reported it to Apple who fixed it, found they hadn’t fixed it properly so reported it again and, some six months later, is still waiting for that fix to appear. Welcome to the strange case of the Su-A-Cyder sandjack attack. To get to grips with sandjacking you first need to understand sandboxing, specifically the Apple iOS sandbox. It is here where every iOS application must run, and must do so to prevent other processes from accessing it or any data that is associated with it. As you can imagine, Apple has put rather a lot of effort into protecting the sandbox from those who would compromise it and the data it can contain. Although that’s not to say those who like to break things haven’t been skimping on their efforts to do the opposite of course.

Click here to read complete article

Research Tags:Apple, iOS, Vulnerability

Post navigation

Previous Post: The rise and rise of ransomware
Next Post: All the phacts about phishing

Related Articles

Jaw-Dropping New Hack Turns Your Phone Screen Into Covert Spy Camera Hacking
Warning As 1Password, DashLane, LastPass And 3 Others Leak Passwords Infosecurity
New iPhone Security Warning As Malicious Lockdown Mode Trick Revealed Apple
iLeakage Hackers Can Read Gmail On All 2020 Or Later iPhones And Macs Apple
New iPhone iOS 16 Bluetooth Hack Attack—How To Stop It Analysis
Free iPhone 14 Pro: Apple Taking Applications Now, But There’s A Catch Apple

Categories

Post Archive

Tags

0day Analysis Android Apple Apps breach bug bounty Business Chrome crime Cybercrime Data Protection Encryption Enterprise Google Government Hackers Hacking Health healthcare industry iOS IoT iPhone Malware Microsoft News NHS Opinion passwords Phishing Privacy ransomware Research Russia Samsung threat intelligence Twitter Update Vulnerabilites vulnerabilities Vulnerability Windows Windows 10 zero-day

Copyright © 2025 Davey Winder .

×
Cookies
We serve cookies. If you think that's ok, just click "Accept all". You can also choose what kind of cookies you want by clicking "Settings". Read our cookie policy
Settings Refuse all Accept all
Cookies
Choose what kind of cookies to accept. Your choice will be saved for one year. Read our cookie policy
  • Necessary
    These cookies are not optional. They are needed for the website to function.
  • Statistics
    In order for us to improve the website's functionality and structure, based on how the website is used.
  • Experience
    In order for our website to perform as well as possible during your visit. If you refuse these cookies, some functionality will disappear from the website.
  • Marketing
    By sharing your interests and behavior as you visit our site, you increase the chance of seeing personalized content and offers.
Save Refuse all Accept all
GDPR Cookie Policy