fbpx

Enter your keyword

“Black Dot of Death” locks iOS messaging app

“Black Dot of Death” locks iOS messaging app

“Black Dot of Death” locks iOS messaging app

People who use iPhones, iPads, and Macs are at risk of encountering a Unicode attack that can cause the messaging app to crash and lock up the device. The good news is a workaround has been found which can restore the state of said Apple products.

What is going on?
A bug, known as “Black Dot,” is locking the messaging app on Apple devices running iOS 11.3 and 11.4 beta with Apple TVs and Apple Watches also at risk.

Black Dot is activated when an iOS user sends another user an iMessage (this is not an SMS) with an emoji of a black dot with a finger pointing at it. Loaded with plenty of invisible Unicode characters, this emoji will overwhelm the CPU and memory, forcing the messaging app to stop functioning and possibly lock up the device.

The affected user may be lucky enough to close the app, but the bug will remain when the program is opened again, causing everything to crash.

How do I squash this bug?
Apple’s development team is still working on a patch to address the issue, but you can apply a temporary remedy to keep your device going.

For devices that have Siri installed:

  • Force close the program.
  • Tell Siri to reply to the sender of the bugged message.
  • Make Siri send replies until you do not see the black dot on the screen.
  • Run the messaging app, tap Back, and remove the message that has the black dot from the list.

If your iPhone has 3D Touch installed:

  • Force close the messaging app.
  • Run 3D Touch on the program. Choose the new message option.
  • When you see the new message window, tap Cancel to see the conversations list.
  • Delete the message with the black dot from the list.

If your Apple device does not have 3D Touch or Siri installed:

  • Try using a different Apple product that is synced to your iCloud account to run and log in to iMessage.
  • Remove the message with the black dot from the conversation list in the former device. Make sure that you do not accidentally open the message in that app.

While this bug is a major issue, it has not infected many Apple products yet. Once the final version of iOS 11.4 is released, the problem should be resolved. If you need more information on properly maintaining your iPhone, iPad, or Mac, feel free to give us a call today!

Published with permission from TechAdvisory.org. Source.

Dropsuite:

Dropsuite is a cloud software platform enabling businesses and organizations globally to easily backup, recover and protect their important business information including emails, contacts, calendars and OneDrive/Sharepoint files. Compliant email backup and archive system with a 10-year retention policy.

Vade Secure:

Vade Secure is an AI-based email security solution to improve security for Office 365 and block advanced phishing, spear phishing, and advanced malware threats. Vade Secure analyzes emails, webpages, attachments, and images with machine learning and deep learning algorithms that are trained to detect behaviors and anomalies common to advanced email threats.

Office Protect:

Office Protect is a service that’s designed to help you secure your Microsoft 365 tenant. Using our powerful in-house security software, our analysts actively monitor for threats, investigate alerts, eliminate false positives, and provide guided response and remediation. Protects against account break-ins, data exfiltration, business email compromise, phishing, internal threats, lateral movement, ransomware, and attacks by nation states.

Dark Cubed:

Dark Cubed focuses on real-time monitoring, threat intelligence, predictive analytics, elegant dashboard, streamlined workflow, executive reporting and active blocking. This is another layer of security that integrates with the firewall.

ThreatLocker:

ThreatLocker is a zero-trust endpoint security tool giving companies control over what software can run, by whom, and what data can be accessed.

It keeps a full detailed audit of what applications are used and data accessed/transferred/deleted and by what users (signature tracking, etc.) If something unusual happens, such as a signature change, or a user opens an application that is out of their normal routine the administrator is alerted. This is a crucial tool in identifying malware threats, as well as helping organizations identify if users are accessing applications and/or data/ files they should not be.

ThreatLocker provides a solution that allows businesses to control the content that runs on their network. Unlike AntiVirus software ThreatLocker is not looking for known viruses or malware. ThreatLocker uses a complex set of rules to determine what can be executed on a network and stops anything that has not been approved before it can even execute.

Huntress:

Huntress is a supplement to SentinelOne. Hackers are becoming more sophisticated, and Huntress actively seeks out these threat actors with a "defend forward" mentality. This software combines both advanced security tools along with human intervention to ensure even the most advanced hackers can't penetrate your network.

SentinelOne:

SentinelOne is a comprehensive enterprise security platform that provides threat detection, hunting, and response features that enable organizations to discover vulnerabilities and protect IT operations. SentinelOne integrates static artificial intelligence (AI) to provide real-time endpoint protection and reduce false positives that derail investigations or make threat detection a capital-intensive process. This will replace Webroot in your current environment.