Industry News

FBI paid over $1.3 million to hack into San Bernadino iPhone that contained ‘nothing of real significance’

Speaking at the Aspen Security Forum in London, FBI Director James Comey has suggested that the agency paid over $1.3 million in order to unlock the iPhone 5C used by Syed Farook Rizwan, one of the terrorists behind last December’s attack in San Bernardino, California.

farook-iphone-600

Comey didn’t come out in plain sight and state the cost of purchasing the exploit from gray-hat hackers, but an answer he gave to a journalist’s question helped quick-witted folks at Reuters do the calculation for themselves.

Comey was asked how much had been paid. His response?

“A lot. More than I will make in the remainder of this job, which is seven years and four months for sure. But it was, in my view, worth it.”

Reuters took that response, and compared it to Comey’s salary (a matter of public record):

“According to figures from the FBI and the U.S. Office of Management and Budget, Comey’s annual salary as of January 2015 was $183,300. Without a raise or bonus, Comey will make $1.34 million over the remainder of his job.”

“That suggests the FBI paid the largest ever publicized fee for a hacking job, easily surpassing the $1 million paid by U.S. information security company Zerodium to break into phones.”

Despite online speculation, it is still unknown who helped the FBI crack into the iPhone (I think we can probably exclude anti-virus veteran John McAfee…), but we do know that in the past controverisal vulnerability broking firms such as Zerodium have offered huge amounts of money for iOS zero-day exploits that they can then sell on to intelligence agencies and other interested parties.

Of course, the most expensive exploits are those which can be used remotely, without physical access to the device that is being attacked, and work on the latest and greatest devices – not the San Bernardino iPhone 5C that was in the possession of FBI investigators.

Whether you think the amount of money paid by the FBI for the ability – without the help of Apple – to crack into the iPhone used by Syed Farook Rizwan is appropriate or not is up to you.

But what we do know is that, according to the FBI themselves, ‘nothing of real significance’ was found on the device.

Apple’s security engineers have worked tirelessly for years, strengthening the iOS operating system from attacks, and things have measurably improved since the iPhone 5C was first launched.

However, the FBI has not disclosed to Apple details of how the iPhone 5C was broken into. Which means that potentially anyone who owns an iPhone 5C, including US government employees, remains at risk.

I think it’s good that Apple wasn’t forced to create a new vulnerability to allow the FBI to break into the San Bernardino iPhone 5C, and am pleased that an existing exploit was used instead. However, I remain concerned that the security hole remains present, and that others could still exploit it.

Unpatched vulnerabilities put the security and privacy of all of us at risk.

About the author

Graham CLULEY

Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats.

Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the "10 Greatest Britons in IT History" for his contribution as a leading authority in internet security.

3 Comments

Click here to post a comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • To be honest, who would use a company device to plot anything illegal? The thought that someone in IT/HR could check the devices would prevent anyone doing so, as the risk of being caught prior to whatever was planned would be high. Ok, in this case his employer hadn't enabled MDM, but did he know this? This is why 'burner phones' are usually used. In Switzerland it has been a requirement that any mobile phone has to be registered, even if on a Pre-Pay account (usually it is the SIM that has to be registered, with some photo ID).

  • My question throughout this who saga has been how much of the publicly released info is legit and how much is a smoke screen or posturing? Did they really need "help" getting into the phone? Did they really not find any valuable info? It would not be surprising to me that the "folks" involved in this investigation might not be playing all their cards publicly, not that it has every happened before…….

  • Bear in mind however that there is no guarantee this isn't a "least untruthful answer" – if the FBI just wanted out from under the case, they could *as easily* claim they spent a fortune on a hack and found nothing, which is effectively free…