New iOS Video Injection Tool Bypasses Biometric Locks on Jailbroken iPhones

New iOS Video Injection Tool Bypasses Biometric Locks on Jailbroken iPhones

A newly discovered video injection tool for iOS devices that have been jailbroken poses a serious threat to modern digital identity verification.

Developed to run on iOS 15 or later, this highly specialized toolkit can circumvent weak biometric checks and even exploit services lacking any biometric safeguards.

Its emergence marks a troubling shift toward automated, scalable attacks against identity systems that rely on video‐based verification.

The attack begins with a jailbroken iPhone, where Apple’s built-in security restrictions have been removed to grant deep system access.

A remote presentation transfer mechanism (RPTM) server on the attacker’s end establishes a connection between a computer and the compromised device.

Once connected, the tool injects pre-crafted deepfake video directly into the device’s video data stream.

These synthetic media clips may include face swaps where one person’s face is overlaid onto another or motion re-enactments, in which still images are animated using motion data from a separate source.

By streaming the manipulated footage into the application’s video input rather than presenting it to the physical camera, the tool deceives verification processes into treating the deepfake as a genuine, real-time feed.

This allows a fraudster to impersonate a legitimate user or fabricate a synthetic identity, effectively bypassing any lock that relies on facial or liveness checks.

The suspected origins of this tool trace back to sources in China, raising alarms amid growing concerns over technological sovereignty and supply-chain security.

Governments worldwide are increasingly vigilant about software and hardware imported from non-allied nations, particularly for sensitive applications like digital identity and border control.

The advent of a programmatic, industrialized attack tool of this caliber elevates the risk profile for any organization that depends on video or biometric gatekeepers for authentication.

“The discovery of this iOS tool marks a significant breakthrough in identity fraud and confirms the trend of industrialized attacks,” warned Andrew Newell, Chief Scientific Officer at iProov.

His team emphasizes the need for liveness detection solutions that can adapt quickly to emerging threat vectors, along with multilayered defenses informed by up-to-date threat intelligence.

Defending against video injection attacks requires an approach that goes beyond simple facial recognition. Organizations must verify three core properties in every identity check:

  1. The Right Person, by matching the presented biometric or credential to official records.
  2. A Real Person, by employing metadata analysis and embedded imagery checks that detect digital spoofs and identify the hallmarks of malicious media.
  3. In Real Time, by using passive challenge-response interactions to guarantee the authenticity of a live session and prevent replayed or injected content.

Additionally, managed detection and response services, such as those offered by iProov’s Security Operations Centre (iSOC), provide ongoing monitoring, incident response, and proactive threat hunting.

This combination of advanced technology and expert analysis makes it exponentially harder for attackers to defeat all layers simultaneously without introducing anomalies that betray their presence.

As digital identity verification continues to supplant traditional passwords and tokens, the rise of tools that can exploit video streams signals a new front in the cyber-fraud arms race.

Only through layered security measures and continuous adaptation can organizations hope to remain one step ahead of these innovative injection attacks.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.


Source link

About Cybernoz

Security researcher and threat analyst with expertise in malware analysis and incident response.