Application Security , Cyberwarfare / Nation-State Attacks , Endpoint Security

Spyware Exposé Highlights Suspected Apple Zero-Day Flaws

'Zero Click' Exploits Suspected in NSO Group Pegasus Spyware Attacks, Amnesty International Says
Spyware Exposé Highlights Suspected Apple Zero-Day Flaws

A new exposé tracking how spyware has been used to target journalists, human rights advocates and dissidents suggests attackers have been exploiting zero-day flaws in Apple applications and devices.

See Also: Live Webinar: Seeking Success by Adopting a SASE Architecture: en el idioma Español

The surveillance effort has been dubbed the Pegasus Project by Amnesty International, 17 media outlets as well as a Paris-based journalist collective called Forbidden Stories, which on Sunday collectively released their findings.

The Pegasus Project focuses on NSO Group, an Israeli company that develops spyware called Pegasus. NSO Group has long been accused of selling spyware to countries that use it to conduct surveillance on activists, journalists and dissidents.

In the latest campaign to be tied to the use of Pegasus software, Forbidden Stories says the long list of targets included "award-winning Azerbaijani journalist Khadija Ismayilova; reporter Szabolcs Panyi from Direkt36, an Hungarian investigative media outlet; freelance Moroccan journalist Hicham Mansouri; the director of the French investigative site Mediapart Edwy Plenel; and the founders of the Indian independent media The Wire, one of the few news organizations in the country that does not rely on money from private business entities."

The Guardian reports that victims include a Mexican journalist and her family members as well as other prominent individuals and business executives that it plans to name in the coming days. It says the Apple flaws were identified after journalists and researchers obtained a leaked list of 50,000 phone numbers tied to individuals of interest to NSO Group's customers and traced it back to the use of Pegasus.

Responding to the new report, NSO Group says in a statement released Monday that after checking the claims therein, "we firmly deny the false allegations made in their report."

Publication of the Pegasus Project's report follows Facebook In October 2019 taking the extraordinary step of suing NSO Group for allegedly developing and using an exploit for its WhatsApp messenger (see Facebook Sues Spyware Maker Over WhatsApp Exploit).

Based on a digital forensic investigation into Apple-using targets, Amnesty International says it believes that Pegasus users have the ability to target the latest version of Apple's mobile operating system - iOS 14.6 - using "zero click" exploits, which refers to attacks that can successfully infect a device with malware without requiring any interaction between a victim and their device.

Apple has confirmed that the attacks, discovered by technical experts working with Amnesty International, are very sophisticated and a serious threat. But it also notes that the highly targeted attacks likely pose no risk to the overwhelming majority of its users.

Amnesty International: At Least 37 Devices Hit

Amnesty International says Pegasus spyware - or signs that it had previously been installed - has been found on at least 37 devices. Applications under attack may include iMessage - Apple's messaging app - as well as Apple Music, it says. Some of the described attacks also affect the latest models and versions of Apple's hardware and software.

"Most recently, a successful 'zero click' attack has been observed exploiting multiple zero-days to attack a fully patched iPhone 12 running iOS 14.6 in July," Amnesty International says in its report.

Amnesty International's results have been independently confirmed by Citizen Lab, a research lab at the University of Toronto's Munk School of Global Affairs that regularly investigates state-sponsored surveillance campaigns against journalists, human rights advocates and other vulnerable groups.

"We at @citizenlab also saw a 14.6 device hacked with a zero-click iMessage exploit to install Pegasus," tweets Bill Marczak, a senior research fellow with Citizen Lab. "All this indicates that NSO Group can break into the latest iPhones."

This isn't the first time that NSO Group has allegedly used zero-click attacks to exploit vulnerabilities in Apple products. In December 2020, Citizen Lab described a separate campaign, attributed to NSO Group's software, which used zero-click attacks against iMessage.

Informed by Amnesty International of the latest findings, Apple says in a statement that it "unequivocally condemns cyberattacks against journalists, human rights activists and others seeking to make the world a better place." But it says the vulnerabilities identified by Amnesty International, while serious, are unlikely to impact most users.

"Attacks like the ones described are highly sophisticated, cost millions of dollars to develop, often have a short shelf life, and are used to target specific individuals," Apple says. "While that means they are not a threat to the overwhelming majority of our users, we continue to work tirelessly to defend all our customers, and we are constantly adding new protections for their devices and data."

Unusual iMessages

Amnesty International cited numerous examples of attacks it studied and how it believed such attacks were being executed.

In one instance, the organization says, an investigative journalist in Azerbaijan was targeted. The journalist, who is not identified by name but instead a code - AZJRN1 - was "repeatedly targeted using zero-click attacks from 2019 until mid-2021."

Amnesty International says the journalist was hit with a fresh and successful infection of Pegasus on July 10. The exploit appears to start with iMessage before also invoking Apple's Music app, although it's unclear what the Music app's role is in the exploit. But that app made an HTTP request to a domain that Amnesty International has identified as being part of the infrastructure used to support Pegasus.

Amnesty International's chart showing forensic indicators of an attack on July 10 against a journalist in Azerbaijan.

"Recent research has shown that built-in apps such as the iTunes Store app can be abused to run a browser exploit while escaping the restrictive Safari application sandbox," Amnesty International writes.

Other attacks indicated a likely vulnerability in iMessage. Some victims' devices, notably, had received iMessage push notifications which appeared to represent the beginning of an attack.

In one example, the device of a Rwandan activist began looking up an unfamiliar iCloud account on May 17. Then, in the ensuing minutes, "20 iMessage attachment chunks are created on disk," according to Amnesty International's technical assessment. That attack didn't appear to be successful, but two others that occurred on June 18 and June 23 did succeed, resulting in Pegasus payloads being installed on the device.

"These most recent discoveries indicate NSO Group's customers are currently able to remotely compromise all recent iPhone models and versions of iOS," Amnesty International writes.

Messaging platforms are tempting targets for hackers since they can accept all kinds of untrusted input and have to parse it in a safe way.

Apple has repeatedly sought to strengthen iMessage's defenses following numerous run-ins with zero-click attacks. For example, researchers at Google's Project Zero last year discovered one such attack in which an attacker only needed to know an Apple user's email address or phone number to completely take over a device via iMessage.

Earlier this year, Apple introduced in iOS 14 a security defense dubbed BlastDoor, which is responsible for parsing untrusted data and also has new sandboxing protections, as Google's Project Zero also detailed. But as Amnesty International's research shows, attackers may have found ways to circumvent even Apple's latest defenses.


About the Author

Jeremy Kirk

Jeremy Kirk

Managing Editor, Security and Technology, ISMG

Kirk is a veteran journalist who has reported from more than a dozen countries. Based in Sydney, he is Managing Editor for Security and Technology for Information Security Media Group. Prior to ISMG, he worked from London and Sydney covering computer security and privacy for International Data Group. Further back, he covered military affairs from Seoul, South Korea, and general assignment news for his hometown paper in Illinois.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.