• 𝒍𝒆𝒎𝒂𝒏𝒏@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    119
    ·
    9 months ago

    Wow, this is a very complex exploit, involving bits of iMessage and an undocumented CPU feature that allowed the attacker to evade hardware memory protection. From what I can see, Lockdown mode would have prevented this. The attacker is ridiculously skilled regardless

    Exerpts from the article missing from the bot summary:

    The mass backdooring campaign, which according to Russian officials also infected the iPhones of thousands of people working inside diplomatic missions and embassies in Russia, according to Russian government officials, came to light in June. Over a span of at least four years, Kaspersky said, the infections were delivered in iMessage texts that installed malware through a complex exploit chain without requiring the receiver to take any action.

    With that, the devices were infected with full-featured spyware that, among other things, transmitted microphone recordings, photos, geolocation, and other sensitive data to attacker-controlled servers. Although infections didn’t survive a reboot, the unknown attackers kept their campaign alive simply by sending devices a new malicious iMessage text shortly after devices were restarted.

    The most intriguing new detail is the targeting of the […] hardware feature […]. A zero-day in the feature allowed the attackers to bypass advanced hardware-based memory protections designed to safeguard device system integrity even after an attacker gained the ability to tamper with memory of the underlying kernel.

    • seang96@spgrn.com
      link
      fedilink
      English
      arrow-up
      24
      ·
      9 months ago

      With that many exploits being used I wouldn’t be surprised to see it is a group probably government sponsored. They love iMessage exploits as original attack vectors too.

      • psud@lemmy.world
        link
        fedilink
        English
        arrow-up
        6
        ·
        9 months ago

        Russian authorities say it was the Americans trying to spy on other NATO nations, Israel, and Ukraine. America spying on Russia’s enemies.

        • lad@programming.dev
          link
          fedilink
          English
          arrow-up
          2
          arrow-down
          1
          ·
          edit-2
          9 months ago

          Well, I may be under the wrong impression but it occurred to me that the US govt likes to spy on everyone, friends and foes and the US citizens, too

          Edit: punctuation

  • LainOfTheWired@lemy.lol
    link
    fedilink
    English
    arrow-up
    37
    arrow-down
    1
    ·
    9 months ago

    It’s not purely talent that allows them to make this kind of stuff. Otherwise people outside of these agencies would be making this stuff too. It’s also the fact the CIA or any of the others can go to apple for example and get all of the information on how these chips are made and the firmware on them, then put the company under a gag order.

    It is silly to assume the governments hackers are any better then a good hacker that doesn’t work for them. And you need to realise that their advantages come from legal power, resources, and lesser regulations on research.

    Because a lot of silly conspiracy theories seem to stem from people believing that the government are somehow superior beings, when the only thing that makes them different from anyone else is power.

    • PM_Your_Nudes_Please@lemmy.world
      link
      fedilink
      English
      arrow-up
      14
      arrow-down
      1
      ·
      edit-2
      9 months ago

      Yup. The government has historically had issues keeping good hackers on their payroll. Because the good ones can make way more money in the private sector, so what incentive do they have to actually stick around?

      There’s also the issue that the federal government has been required to drug test due to regulations requiring all federal employees to be tested. And good luck finding a good hacker who would be willing to take a drug test.

      The only real edge the government hackers have is that they can force companies to give them insider access.

      • agitatedpotato@lemmy.world
        link
        fedilink
        English
        arrow-up
        7
        arrow-down
        2
        ·
        9 months ago

        If you hire the hackers that tried to hack you instead of sending them to prison, you can fix the talent retention problem, but I think they already figured that out. Wonder if the kid who hacked GTA is being looked at in that way or if they don’t want to deal with his mannerisms.

        • test113@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          9 months ago

          This happens rarely, and if it happens, the chances of it being someone we know from the media are almost 0; that would be all under the table. The “best” are the ones you don’t hear about because they are too busy working on actual stuff, same in most science fields.

          Most of them are recruited in “normal” ways; there is much more talent around these days. No need to engage with criminals and put them on actual sensitive stuff. Also, they get paid more than you might think; the people leading these projects are not stupid and make a simple mistake like underpaying talent they still need.

        • Riven@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          1
          ·
          9 months ago

          Dude hacked again from within his hotel using the tv right? I wonder who’s in charge of doing that math. Hacker skill vs idiosyncrasies

  • sirdorius@programming.dev
    link
    fedilink
    English
    arrow-up
    32
    ·
    9 months ago

    The exploit’s sophistication and the feature’s obscurity suggest the attackers had advanced technical capabilities

    exploiting a vulnerability in an undocumented hardware feature that few if anyone outside of Apple and chip suppliers such as ARM Holdings knew of.

    according to Russian officials also infected the iPhones of thousands of people working inside diplomatic missions and embassies in Russia

    the devices were infected with full-featured spyware that, among other things, transmitted microphone recordings, photos, geolocation, and other sensitive data to attacker-controlled servers

    Sounds like government espionage

    puts tinfoil hat on

  • AutoTL;DR@lemmings.worldB
    link
    fedilink
    English
    arrow-up
    20
    ·
    9 months ago

    This is the best summary I could come up with:


    Researchers on Wednesday presented intriguing new findings surrounding an attack that over four years backdoored dozens if not thousands of iPhones, many of which belonged to employees of Moscow-based security firm Kaspersky.

    Chief among the discoveries: the unknown attackers were able to achieve an unprecedented level of access by exploiting a vulnerability in an undocumented hardware feature that few if anyone outside of Apple and chip suppliers such as ARM Holdings knew of.

    “The exploit’s sophistication and the feature’s obscurity suggest the attackers had advanced technical capabilities,” Kaspersky researcher Boris Larin wrote in an email.

    “Our analysis hasn’t revealed how they became aware of this feature, but we’re exploring all possibilities, including accidental disclosure in past firmware or source code releases.

    A fresh infusion of details disclosed Wednesday said that “Triangulation”—the name Kaspersky gave to both the malware and the campaign that installed it—exploited four critical zero-day vulnerabilities, meaning serious programming flaws that were known to the attackers before they were known to Apple.

    The researchers found that several of MMIO addresses the attackers used to bypass the memory protections weren’t identified in any device tree documentation, which acts as a reference for engineers creating hardware or software for iPhones.


    The original article contains 653 words, the summary contains 200 words. Saved 69%. I’m a bot and I’m open source!

  • Elias Griffin@lemmy.world
    link
    fedilink
    English
    arrow-up
    15
    arrow-down
    3
    ·
    9 months ago

    I recently invented a “People First” Cybersecurity Vulnerability Scoring method and I called it CITE, Civilian Internet Threat Evaluation with many benefits over CVSS. In it, I prioritize “exploit chains” as the primary threat going forward. Low and behold, this new exploit, although iOS, possibly one of the most sophisticated attacks ever using one of the longest exploit chains ever! Proof positive!

    Depending on how you define it; I define the Kaspersky diagram has 8 steps. In my system, I define steps that advance the exploit discretely as stages, so I would evaluated Triangulation to be a 4 stage exploit chain. I should tally this attack to see how it scores and make a CITE-REP(ort).

    You can read about it if interested. An intersting modeling problem for me was does stages always equate to complexity? Number of exploits in the chain make it easier or harder to intrusion detect given that it was designed as a chain, maybe to prevent just that? How are stages, complexity, chains and remediation evaluted inversely?

    https://www.quadhelion.engineering/articles.html

  • JustUseMint@lemmy.world
    link
    fedilink
    English
    arrow-up
    8
    arrow-down
    1
    ·
    edit-2
    9 months ago

    There are few groups I think they could pull off such a stunt and would even want to. Nation state actors from the US such as CIA/NSA, or China, like the Ministry of Industry and Information Technology. They have a many other gov sectors with very talented APT groups. I’d bring up that NK nation state actors are also very talented, but they’ve been recently aligned with Russia. Perhaps their loyalty to the CCP is stronger than their current Russian ties.

    • Elias Griffin@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      ·
      9 months ago

      Skill is certainly one evaluation parameter and Fin7, JokerStash, Carbanak fit that bill but that is not their MO. Target, motive, opportunity -> Embassy Employees/Diplomats -> Nation-State or Intergovernmental Group (like 5/9/14 eyes) as eval combined with skill rating, @95% confidence.

  • Treczoks@lemmy.world
    link
    fedilink
    English
    arrow-up
    7
    arrow-down
    1
    ·
    9 months ago

    I wonder how many of those exploits were long known by the three-letter agencies, and were hoarded instead of getting fixed.

  • Kairos@lemmy.today
    link
    fedilink
    English
    arrow-up
    1
    arrow-down
    5
    ·
    9 months ago

    Can the US government pass a law to force Apple specifically to rip out the messages app and replace it with something that apparently doesn’t have infinite exploits??