Activation Lock Bypass for iOS 7, iCloud

Wednesday, May 28, 2014 @ 12:05 PM gHale

There is a way to bypass Apple’s iCloud Activation Lock failsafe, allowing users with locked devices to get them up and running again.

But, as with all little things that bypass security measures, the sinister side actually shows it can circumvent an avenue that cuts back on thefts of the popular iPhone.

New, Simple Way to Avoid Spam Filters
MyBB Release Fixes Security Holes
Video Site Hole Linked to DDoS Hit
DDoS Attacks a Smokescreen for Data Theft

The hacking team at doulCi (which is actually an anagram of iCloud and comprised of MerrukTechnolog and AquaXetine) is where people with locked iDevices can go and have them freed in seconds.

The doulCi site explains every step of the process, with the hacker duo noting in black over white that “doulCi was built with love for the people, to give them a second chance to get there [sic] iDevices working again for simple use, and we have made this project because we are thinking about you and how we can be helpful for you and your family.”

However, the hack indirectly also allows iPhone and iPad thieves to get their stolen goods up and running again, essentially making these devices sellable on the black market.

“This amazing tool called doulCi can get bypass the iCloud Activation Lock and get your device working again partially to get back your digital life, contacts, mail, notes, etc.,” the team said.

MerrukTechnolog and AquaXetine said “doulCi is built only for personal use, and conditionally for the original owners which have lost/got hacked or forgot there login info.” Of course, that’s not going to stop criminals from using the tool to turn a profit selling stolen iDevices. The hackers also credit PilzXtac as their “partner in crime.”

To their credit, the duo claim to have tipped Apple off regarding the discovery of their flaw in iOS/iCloud.

“They have asked me to contact [them] as quickly as possible, but why now?” AquaXetine said. “I’ve already warned Apple couple months ago.”

The Mac-centric site asked security researcher and iOS hacker Steven De Franco for his take on the vulnerability. De Franco described it as a “man-in-the-middle attack,” adding that “It seems like it’s a firmware related bug. So it would require a new update [from Apple] to patch it.”

Leave a Reply

You must be logged in to post a comment.