Company Pays Hackers $3 Million for Windows, iPhone Zero-Day Exploits Dubai startup seeking unpatched flaws to sell them to govts April 26, 2018 https://news.softpedia.com/news/com...windows-iphone-zero-day-exploits-520867.shtml
I bet they just plug the greykey device into the USB so it can masquerade as a keyboard to then brute force the pitifully insecure 6 char password. I don't have a USB keyboard to test that with, but the time frames described for the greykey device to unlock a phone are definitely in the realm of brute force attacks. To test this theory we need an iPhone and a USB keyboard, if the USB keyboard is active while the phone is locked and can be used to enter the unlock code, then there is your exploit. If that is the case, to mitigate would be to find a way to disable the usb keyboard driver until after the device is unlocked.
Well the question still remains how you disable iPhone's anti-brute force protections (longer times it takes to enter each new guess and bricking device after 10 unsuccessful attempts). Guessing is not a hard part, circumventing their protections is whole other story.
When you think about it, it is probably a moot point. For this company to market the device and for law enforcement to buy it we might assume they all have reason to believe Apple is not anytime soon going to patch the "exploit". There is only one way they could all know that. Further to that point, if hackers could acquire one of the devices and find out how it works, a multi billion dollar corporation like Apple sure could too. So it would not take much of a stretch to assume Apple is complicit in this and if that is the case, it's game over already.
Crowdfense platform to allow researchers to safely submit, discuss and sell 0day exploits https://www.helpnetsecurity.com/2018/08/10/crowdfense-platform/