Mobile Threat Catalogue

PIN/password Brute Force

Contribute

Threat Category: Authentication: User to Device

ID: AUT-2

Threat Description: Short or easy to guess PINs can be brute forced to unlock the device.

Threat Origin

Not Applicable, See Exploit or CVE Examples

Exploit Examples

Black Box Brouhaha Breaks Out Over Brute Forcing of iPhone Pin Lock 1

The bumpy road towards iPhone 5c NAND mirroring 2

CVE Examples

Not Applicable

Possible Countermeasures

Mobile Device User

To directly increase the time required for a successful brute-force authentication attempt, increase the length, complexity, and randomness of device unlock codes, with a strong preference for a ‘password’ option that may contain letters (uppercase and lowercase), numbers, and special characters, rather than a simpler numeric PIN or (on Android devices) a geometric pattern.

To increase the time required to perform brute-force attacks, use mobile devices that incur incrementally increasing delays when the wrong unlock code is entered.

To reduce the likelihood of a successful brute-force user-to-device authentication attempt on a device, configure the device to wipe all device data after a preset number of consecutive failed unlock attempts (e.g., 10).

To reduce the opportunity for an attacker to conduct a brute-force authentication attack against the device, use strong physical security measures (e.g.,locking the device into a container) when not directly attended.

Enterprise

To prevent employees from accessing enterprise resources from devices with a weak device unlock code, deploy MDM or containerization solutions that enable device configuration policies that require the unlock code for enrolled devices to meet minimum length and complexity requirements prior to granting access to enterprise resources.

To increase the time required to perform brute-force attacks, use mobile devices that incur incrementally increasing delays when the wrong unlock code is entered.

References

  1. P. Ducklin, “Black Box” Brouhaha Breaks Out Over Brute Forcing of iPhone Pin Lock”, Naked Security, Sophos, 17 Mar. 2015; https://nakedsecurity.sophos.com/2015/03/17/black-box-brouhaha-breaks-out-over-brute-forcing-of-iphone-pin-lock/ [accessed 8/25/2016] 

  2. S. Skorobogatov, “The bumpy road towards iPhone 5c NAND mirroring,” University of Cambridge Computer Laboratory, Cambridge, MA, 2016; https://webamooz.com/wp-content/uploads/bot/offsecmag/273.pdf [accessed 8/1/2022]