Skip to main content

A $1 million prize for hacking iOS 9 has been won, and the method used is about to be sold

An anonymous team of hackers has been awarded a million-dollar bounty after successfully hacking Apple’s IOS 9.1 mobile operating system. The money has been paid out by Zerodium, a company that pays for security information and exploits, ready to sell them on to the highest bidder. It announced the competition — which it called The Million Dollar iOS 9 Bug Bounty — in late September, and confirmed it had a winner via its official Twitter account at the beginning of November.

According to Zerodium’s founder Chaouki Bekrar, speaking to Wired, there were two teams in the hunt for victory, but only one came up with the real deal. The company was looking for something far beyond the publicly available jailbreak methods, requiring a browser or SMS-based, remotely carried out hack, that would result in the “remote, privileged, and persistent installation of an arbitrary app.”

Recommended Videos

However, while this sounds innocuous, Zerodium will go on to sell the hack to its customers, which apparently include technology companies, finance institutions, and defense corporations. Government agencies are also mentioned as Zerodium clients. Bekrar says he expects to sell the new iOS hack to a U.S. customer. While such exploits could be valuable to companies wanting to ensure their own devices are highly secure, they could also be equally valuable to those interested in illicit surveillance.

There’s little chance of the vulnerabilities being fixed by Apple in the very near future, at least off the back of this competition, because Zerodium has no intention of informing Apple of the methods used at this time. It may do so at a later date, but certainly not before its big payday. If you’re wondering, while ethically questionable, Zerodium and its clients aren’t doing anything illegal. The million-dollar bug hunt bounty competition is therefore unlikely to be the last of its type, given the obvious financial benefit to all involved.

Andy Boxall
Andy is a Senior Writer at Digital Trends, where he concentrates on mobile technology, a subject he has written about for…
AI-powered Priority Notifications land on iPhones with iOS 18.4 update
Priority Notifications on an iPhone’s Lock Screen

Apple has just released the first beta build of iOS 18.4 update. Even though it is not loaded with new features, it brings a cool new trick called Priority Notifications. Once enabled, the tool will use AI to automatically surface notifications that are deemed important.

”Priority notifications appear at the top of the stack, letting you know what to pay attention to at a glance,” says Apple. The company doesn’t offer any technical detail on how exactly the onboard AI decides which notifications are important and surfaces them.

Read more
The latest iOS update might have reactivated Apple Intelligence features
A person holding the Apple iPhone 16 Pro Max.

Some iPhone users have reported that yesterday's update to iOS 18.3.1 reactivated once-disabled Apple Intelligence features on specific devices. Certain features, like Notification Summaries, had been shut off over concerns about accuracy. Now users are reporting that these features have been re-enabled following the update.

Devices that displayed a welcome screen after updating seem to have a higher chance of these features being re-activated. Reddit user u/Hanthunius reported the bug on their iPhone 15 Pro Max, while others saw the features make a comeback on Mac devices. MacRumors tested this theory, and while Apple Intelligence remained disabled on iPadOS and iOS in their tests, the Mac Mini was a different story.

Read more
Apple seeds critical update to guard iPhones from USB hacking tools
Installing iOS 18.3 update on an iPhone 16 Pro.

Apple has released a fresh software update for iPhones and iPads to plug a critical flaw that could allow bad actors to extract data even from a locked device. The company says if granted physical access, an attacker could break past the safety of USB Restricted Mode on the target iPhone or iPad.

The aforementioned guardrail prevents USB accessories from pulling data from an iPhone that has been sitting in a locked state for over an hour. It seems there was an authorization flaw within Apple’s Accessibility framework that could allow an attacker to disable the USB Restricted Mode safety net.

Read more