{"id":15051,"date":"2019-04-09T10:45:04","date_gmt":"2019-04-09T18:45:04","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/04\/09\/news-8800\/"},"modified":"2019-04-09T10:45:04","modified_gmt":"2019-04-09T18:45:04","slug":"news-8800","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/04\/09\/news-8800\/","title":{"rendered":"&#8216;Exodus&#8217; Spyware Posed as a Legit iOS App"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5cab8c76a9dec018a0837f69\/master\/pass\/apple-852081604.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Mon, 08 Apr 2019 19:49:52 +0000<\/strong><\/p>\n<p><span class=\"lede\">Private companies around <\/span>the world have evolved a <a href=\"https:\/\/www.wired.com\/2016\/08\/hacking-group-selling-ios-vulnerabilities-state-actors\/\">gray industry<\/a> supplying digital surveillance and hacking tools to governments and local law enforcement. As the once little-known practice has grown, <a href=\"https:\/\/www.wired.com\/story\/evidence-that-ethiopia-is-spying-on-journalists-shows-commercial-spyware-is-out-of-control\/\">so too has the resulting malware<\/a>. Researchers have now found that one of these spyware products, which had previously been found on the Google Play Store, also targeted iOS.<\/p>\n<p>At the Kaspersky Security Analyst Summit in Singapore this week, researchers from the mobile security firm Lookout will present <a href=\"https:\/\/blog.lookout.com\/esurv-research\" target=\"_blank\">findings<\/a> on the iOS version of the spyware known as Exodus. The nonprofit Security Without Borders published details of the Android version in conjunction with <a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/43z93g\/hackers-hid-android-malware-in-google-play-store-exodus-esurv\" target=\"_blank\">Motherboard<\/a> at the end of March. The fact that Exodus has an iOS version, though, shows the impressive reach of the malware and the resources behind it.<\/p>\n<p class=\"paywall\">And the stakes are high. The iOS version of Exodus, built to look like a mobile carrier support app, used all of the mechanisms iOS offers legitimate apps to grab as much of a target\u2019s data as possible.<\/p>\n<p class=\"paywall\">It is unclear whether Exodus targeted specific individuals or a broader group, but over the past year, the researchers observed attackers setting up phishing traps to direct users toward the malicious apps. The sites were designed to look like information pages for mobile carriers based in Italy and Turkmenistan\u2014Wind Tre SpA and TMCell, respectively. From there, the pages led victims to the Google Play Store or an Apple workflow for downloading enterprise apps.<\/p>\n<p class=\"paywall\">Attackers were able to slip the Android app directly into Google Play, but they either couldn&#x27;t get it into Apple&#x27;s App Store or didn&#x27;t try. Instead they used Apple\u2019s Developer Enterprise Program\u2014a platform that institutions can use to distribute their own apps in-house\u2014to spread their spyware in a legitimate-looking way. Apple keeps its app ecosystem fairly locked down; the only way to install software on non-jailbroken iOS devices is to either sneak the app past Apple\u2019s App Store review process or get a certificate for enterprise distribution. It&#x27;s relatively <a href=\"https:\/\/www.reuters.com\/article\/us-apple-piracy-idUSKCN1Q3097\" target=\"_blank\">easy<\/a> to <a href=\"https:\/\/developer.apple.com\/programs\/enterprise\/\" target=\"_blank\">buy<\/a> one of these certificates from Apple and costs only $300. This approach has become increasingly common as a way for attackers to spread iOS malware, and it has also come up in <a href=\"https:\/\/www.wired.com\/story\/apple-blocks-google-employee-apps\/\">controversies<\/a> over how companies like Facebook and Google distribute consumer-testing and feedback apps.<\/p>\n<p class=\"paywall\">Once installed, Exodus could access photos, videos, device IDs, audio recordings, and contacts on target devices, while also potentially tracking a victim&#x27;s location and listening to their conversations through the iPhone or iPad&#x27;s microphone. Both the Android and iOS versions of Exodus have now been blocked. Apple declined to comment.<\/p>\n<p class=\"paywall\">\u201cIn terms of capabilities on the iOS side, they\u2019re doing pretty much everything I\u2019m aware of that you can do through documented Apple APIs, but they\u2019re abusing them to do surveillance-type activities,\u201d says Adam Bauer, a senior staff security intelligence engineer at Lookout. \u201cFinding surveillance-ware on Android or even iOS is not necessarily uncommon. But finding an actor like this is actually relatively rare. The main differentiator with this actor is the level of professionalism that we\u2019ve seen from them.\u201d<\/p>\n<p class=\"paywall\">The Lookout researchers say that developers seem to have been working on and releasing Android versions of Exodus for the past five years. On Android, the spyware works in three phases to gain deep access to victims&#x27; devices, first establishing a foothold, then installing a larger payload that sets up the surveillance capabilities, and then exploiting a vulnerability to gain root device access. The Android malware led the researchers to the phishing sites used to direct victims to the apps, which in turn led to the iOS app.<\/p>\n<p class=\"paywall\">The iOS version, which seems to have emerged more recently, does not rely on exploits to establish pervasive device access, instead counting on users to unintentionally give permission for the app to run its surveillance tools. Lookout\u2019s Bauer points out that users could have potentially neutered the iOS app\u2019s surveillance by turning off some of its access, but anyone who had already been tricked into thinking the app was legitimate might not question it.<\/p>\n<p class=\"paywall\">The researchers say that Exodus\u2019 development and distribution mechanisms show a high level of professionalism and care. For example, the command and control infrastructure was closely monitored and guarded\u2014a precaution many malware makers forget. In analyzing this framework, the researchers say they found indications that Exodus may have been developed by the Italian video surveillance software company <a href=\"https:\/\/web.archive.org\/web\/20190114193603\/http:\/\/www.esurv.it\/\" target=\"_blank\">eSurv<\/a> and a company it acquired in 2016 known as Connexxa. eSurv\u2019s website is no longer live, and the company could not be reached for comment.<\/p>\n<p class=\"paywall\">\u201cThere\u2019s always a lot of talk about malware on Android in particular, but this was actually a case where both of the mobile platforms are affected,\u201d says Christoph Hebeisen, senior manager of security intelligence at Lookout. \u201cAnd in both cases, because of the enterprise deployment of iOS and because of the Play Store on Android, it was a reasonably legitimate-looking distribution mechanism. So protecting your mobile devices against these things is really crucial.\u201d<\/p>\n<p class=\"paywall\">Mobile users can take precautions to try to avoid spyware by staying vigilant about avoiding phishing links and sticking to mainstream apps downloaded directly from Google Play or Apple\u2019s App Store. But Exodus\u2019s presence on both platforms shows just how difficult it is in practice to skirt insidious, well-crafted spyware. And unfortunately, there&#x27;s more and more of it out there all the time.<\/p>\n<p class=\"related-cne-video-component__dek\">With iOS10 on its way, we thought we\u2019d look back at the way iOS changed the world. But the most pivotal thing in iOS history is something Apple got right on its very first try.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/exodus-spyware-ios\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5cab8c76a9dec018a0837f69\/master\/pass\/apple-852081604.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Mon, 08 Apr 2019 19:49:52 +0000<\/strong><\/p>\n<p>Researchers had already found a spyware app called Exodus plaguing Android. Now it has shown up on iPhones.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21358],"class_list":["post-15051","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-cyberattacks-and-hacks"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15051","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15051"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15051\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15051"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15051"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15051"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}