top | item 28516095

NSO Group iMessage Zero-Click Exploit Captured in the Wild

940 points| jbegley | 4 years ago |citizenlab.ca | reply

326 comments

order
[+] theshadowknows|4 years ago|reply
I always wonder what it takes to find this kind of exploit. Are the programmers at NSO group just the best in the world? Or are they incredibly lucky? Both? I’d love to know what a normal day at work is like for their engineers. Clock in, sit down at a…crazy expensive hardware and software testing station? Crack open a brand new iPhone and start probing away while referencing internet sourced chip documentation and software manuals? What does it even look like?
[+] giarc|4 years ago|reply
I recently learned of this group through the Dark Net Diaries podcast. The host does a pretty good job of covering the NSO group in episode 99 and 100.

https://darknetdiaries.com/episode/

[+] Operyl|4 years ago|reply
I heavily recommend reading “This is How They Tell Me The World Ends” written by one of the guests he had in episode 98, Nicole Perlroth (which also touched a little on the NSO in that episode). She’s The NY Times cybersecurity reporter. A lot of the book focused on the NSO, among others.
[+] ehsankia|4 years ago|reply
The noteworthy angle/point the podcast covers is that NSO is very likely indirectly trying to dig dirt on citizenlab people (same people the post above is from) as they regularly discover their exploits and cost them money. As Jack talks about at the end, this puts NSO group into a whole other category if the above is indeed true.
[+] adamgordonbell|4 years ago|reply
Those episodes were great!

It sounded like NSO group just considers loosing zero days like this a cost of doing business.

There seemed to be an implication that they have a war chest of these exploits and expect them to each get burnt after a certain amount of usage.

[+] badRNG|4 years ago|reply
This episode just came out last week, and this is the second time NSO has made news since it aired (along with Germany being a confirmed client.) Surprisingly apropos, but I imagine Jack's disappointed the big news makes it just after his episode's release on the subject.
[+] trangus_1985|4 years ago|reply
If you're interested in infosec/appsec, DND is a great place to get started. The host packages up stories in a well put-together way, has no qualms about breaking to explain a concept or term, and does it all within an hour.
[+] Ms-J|4 years ago|reply
It is increasingly bizarre in my opinion how this company (and others like Toka) can run active terrorist operations, that if anyone else smaller was doing some of the same hacks they would be in prison for a very long time.

People have lost their lives due to these pariahs!

Israel already has a massive PR issue with other countries, it would do them well to reign in these offensive front arms of their government/'companies.'

Citizen Labs is really a great thing for civilization. There are not enough altruistic organizations.

[+] TaylorAlexander|4 years ago|reply
It just makes me so uncomfortable that these things keep happening. We always find out about these things eventually but what percentage of the time are our devices vulnerable? Isn’t it close to 100% of the time that our desktops and mobile devices have significant security vulnerabilities?
[+] overkill28|4 years ago|reply
The way I describe it to friends and family is that there are basically two levels of protection:

- Protecting yourself from rub of the mill malware that is looking to make money off of you. You can do this pretty effectively by always updating your software as soon as you can and avoiding sketchy and unnecessary apps and websites

- Protecting yourself from an attack by a nation state level agency. I don't think there is any way to be safe from this, and people who are targeted like this need to use protection that go well beyond the choice of cell phone or chat app

[+] r00fus|4 years ago|reply
Invulnerability for your devices is a chimera. You can only do what's possible in your capacity to secure yourself.

I am at peace with the fact that I'm doing the best I can and keeping those I love protected.

[+] SheinhardtWigCo|4 years ago|reply
Their high-confidence attribution to NSO Group is described as being based on two factors:

1. Incomplete deletion of evidence from a SQLite database, in the exact same manner observed in a previous Pegasus sample;

2. The presence of a new process with the same name as a process observed in a previous Pegasus sample.

But isn't it likely that someone with the skills needed to discover and weaponize a chain of 0-day exploits, is incentivized and able to detect these quirks in Pegasus samples and imitate them, with the goal of misattribution?

Of course, there may be more factors involved in the attribution that aren't being shared publicly.

[+] Hnrobert42|4 years ago|reply
It seems like incomplete deletion of data is an error. If you are an exploit developer looking to throw investigators off your trail, it is one thing to name your processes with Pegasus names. It is another to deliberately introduce errors in your exploit to appear like Pegasus.

Your proposal is possible. It is just less likely than that this exploit was developed by NSO Group.

[+] Leparamour|4 years ago|reply
Since when do we assume misattribution in fingerprinting APTs?

Crowdstrike will find out it's clearly Russia behind this and Mandiant will blame China.

[+] r00fus|4 years ago|reply
Buried lede: Apple has patched that particular exploit [1] and everyone should download iOS14.8 now if you want to be protected (no doubt NSO has other tricks up their sleeve).

Edit: Just realized it also impacts macOS and watchOS as well which were also patched. Patch Monday!

[1] https://support.apple.com/en-ca/HT212807

[+] DangerousPie|4 years ago|reply
Anybody know why there was such a delay here?

> In March 2021, we examined the phone of a Saudi activist who has chosen to remain anonymous, and determined that they had been hacked with NSO Group’s Pegasus spyware. During the course of the analysis we obtained an iTunes backup of the device.

...

> Citizen Lab forwarded the artifacts to Apple on Tuesday, September 7. On Monday, September 13, Apple confirmed that the files included a zero-day exploit against iOS and MacOS.

[+] vjust|4 years ago|reply
I once worked in a 'dissident' org (supported by the US Agency for International Development) - these orgs were fighting for human rights in their countries. In one extreme case/country, my prospective project team mate, no one knew her real name (came to know this later), though she was our colleague, was quite social and pleasant. In her country's expatriate circles in DC, she was worried about foreign spies. Family back home is at risk, and so is she, even if she lives in DC. These are brave people.

She wanted to build a database of something, and we were like, "keep your phone in another room" if you want to come discuss. Something that I am not sure she practices but more people need to practice.

CitizenLab is doing yeoman's service for people's rights to privacy and human rights. They're heroes.

[+] abvdasker|4 years ago|reply
I'm glad you put "dissident" in quotes. USAID is notoriously rife with CIA plants and many CIA operatives use the organization as cover, which implies that a nation targeting its members would have a lot more justification than a homegrown activist. That USAID might be targeted by hackers is mostly a consequence of the US government's decision to use it as a front for clandestine operations overseas.
[+] eynsham|4 years ago|reply
> supported by the US Agency for International Development

Isn’t it more usual for the NED to do such things? I remark upon this because it occurs to me that using USAID to do politics might make recipients suspicious of aid even when it’s both necessary from a humanitarian perspective and unlikely to threaten the ruling dispensation in the recipient country. (This is a separate question from whether the NED/US government as a whole should even involve itself in such matters, to which my answer is ‘maybe’, since the dubious stuff probably happens anyway and lots of these civil society organisations &c. actually do good work [e.g. the The Assistance Association for Political Prisoners in Burma.])

[+] q_andrew|4 years ago|reply
It seems like the NSO group is some kind of Hydra where every time their exploits are thwarted they find 2 new ones. The difference is that Hydras go for demigods while NSO products target civil servants and minorities.
[+] baobabKoodaa|4 years ago|reply
> Despite the [gif] extension, the file was actually a 748-byte Adobe PSD file.

I wish programmers would stop "helpfully parsing" files which are named with an "incorrect" extension. If a random unknown person sends me a file with .gif extension that is actually a PSD file, I most definitely do not want my machine parsing whatever that thing is.

[+] willis936|4 years ago|reply
Discourse avatars point to a page with a .png extension regardless of what the actual file is (jpg, gif, or svg). Parsing file headers should not be a dangerous operation and in my opinion is the right thing to do.
[+] stefan_|4 years ago|reply
The easiest way for Apple to find Zero-Day exploits is presumably just to register an iPhone to some Saudi activist and regularly take memory dumps.
[+] avnigo|4 years ago|reply
You joke, but maybe one way to fight this proactively is with fake activist honeypots. Apple, a company with the size and budget of a nation state could certainly pull off such an operation for the security of the devices they sell, but obviously, and maybe unfortunately, this would never happen.
[+] fragmede|4 years ago|reply
That's actually where this particular knowledge came from. Citizen Lab dumped a Saudi activist's phone and told Apple what they found.
[+] United857|4 years ago|reply
I miss the days when iOS exploits were merely used for jailbreaks and allowing alternative app stores, instead of being weaponized/monetized as they are now.
[+] 2rsf|4 years ago|reply
Were they? maybe we simply haven't heard about those
[+] verytrivial|4 years ago|reply
Image and video decoders seem like exactly the right target for formally verified (i.e. proven) implementations. There are just so many moving parts, and libraries get re-used in many projects, rarely forming the 'special sauce' in any given app.

I have been keeping an eye on the work done by what is now called Project Everest[1] over the years in the communication and cryptographic space.

Is there similar work in the image and video decode space? My seach fu is not yeilding anything beyond some hardware decoding proofs.

[1] https://project-everest.github.io/

[+] mortenjorck|4 years ago|reply
Is there a reason why quarantining image attachments from unknown senders hasn’t been standard industry practice ever since Stagefright?
[+] defaulty|4 years ago|reply
This report says they discovered this in March.

The NY Times [1] just reported that "Apple’s security team has been working around the clock to develop a fix since Tuesday, after researchers at Citizen Lab, a cybersecurity watchdog organization at the University of Toronto, discovered that a Saudi activist’s iPhone had been infected with spyware from NSO Group."

What took so long? Did Apple not know about this in March or was someone sitting on it for 6 months?

[1] https://www.nytimes.com/2021/09/13/technology/apple-software...

[+] robocat|4 years ago|reply
“Citizen Lab forwarded the artifacts to Apple on Tuesday September 7.” — from article, no need to jump to unwarranted conclusions about Apple. “In March 2021, we examined the phone of a Saudi activist” - it would be interesting to know the reason why Citizen Lab delayed so long. Hopefully they just wanted time to discover who else was being targeted?
[+] jasonhansel|4 years ago|reply
Why is it that iOS's PDF implementation has been the source of so many different exploits? This seems to be a pattern.
[+] mr_toad|4 years ago|reply
Adobe Reader/Acrobat used to be go-to surface for exploits back in the day. It’s a huge specification.
[+] thinkharderdev|4 years ago|reply
PDF is basically a programming language, so instead of sending image data you send a program which is interpreted by the PDF reader to render an image on the client. That makes it really hard to secure completely.
[+] tediousdemise|4 years ago|reply
It's not just iOS. PDFs have always been an insecure attack vector.
[+] kome|4 years ago|reply
A public university doing wonderful work again state sponsored spyware. Thank you University of Toronto! You restore my faith in academia.
[+] jonplackett|4 years ago|reply
Can someone explain like I'm 5 why it's so hard to prevent this?

I mean with a messenger app, you know you're getting some payload of data from a specific place, that goes through your own server, and is only ever going to be text or picture or video.

Why can't that be sufficiently sanitised en route and as it arrives to not have this kind of thing happen all the time?

[+] danicgross|4 years ago|reply
Would turning off iMessage protect from this? Or would the iPhone still process the GIF through SMS somehow...?
[+] aacook|4 years ago|reply
Great question. Every cell carrier processes images before delivering to the recipient. Like, if you send 3 or more photos almost every cell carrier will downsize the images. While this isn't an extensive test, I just tried renaming a PDF to a GIF and it failed to send on Google Voice and T-Mobile.
[+] onedognight|4 years ago|reply
You can disable MMS in

    Settings -> Messages -> MMS Messaging.