{"id":16030,"date":"2019-08-08T10:45:24","date_gmt":"2019-08-08T18:45:24","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/08\/08\/news-9773\/"},"modified":"2019-08-08T10:45:24","modified_gmt":"2019-08-08T18:45:24","slug":"news-9773","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/08\/08\/news-9773\/","title":{"rendered":"Hackers Can Break Into an iPhone Just by Sending a Text"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5d4b3bee75777400081f29e7\/master\/pass\/security%20-%20imessage%20hack%20v2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Wed, 07 Aug 2019 21:07:26 +0000<\/strong><\/p>\n<p><span class=\"lede\">When you think <\/span>about how hackers could <a href=\"https:\/\/www.wired.com\/story\/smartphone-security-101\">break into your smartphone<\/a>, you probably imagine it would start with <a href=\"https:\/\/www.wired.com\/story\/resist-phishing-attacks\">clicking a malicious link<\/a> in a text, <a href=\"https:\/\/www.wired.com\/story\/imposter-fortnite-android-apps-already-spreading-malware\">downloading a fraudulent app<\/a>, or some other way you accidentally let them in. It turns out that&#x27;s not necessarily so\u2014not even on the iPhone, where simply receiving an iMessage could be enough to get yourself hacked.<\/p>\n<p>At the Black Hat security conference in Las Vegas on Wednesday, Google Project Zero researcher Natalie Silvanovich is presenting multiple so-called \u201cinteraction-less\u201d bugs in Apple\u2019s iOS iMessage client that could be exploited to gain control of a user\u2019s device. And while Apple has already patched six of them, a few have yet to be patched.<\/p>\n<p class=\"paywall\">\u201cThese can be turned into the sort of bugs that will execute code and be able to eventually be used for weaponized things like accessing your data,\u201d Silvanovich says. \u201cSo the worst-case scenario is that these bugs are used to harm users.\u201d<\/p>\n<p class=\"paywall\">Silvanovich, who worked on the research with fellow Project Zero member Samuel Gro\u00df, got interested in interaction-less bugs because of a recent, <a href=\"https:\/\/www.wired.com\/story\/whatsapp-hack-phone-call-voip-buffer-overflow\/\">dramatic WhatsApp vulnerability<\/a> that allowed nation-state spies to compromise a phone just by calling it\u2014even if the recipient didn\u2019t answer the call.<\/p>\n<p class=\"paywall\">But when she looked for similar issues in SMS, MMS, and visual voicemail, she came up empty. Silvanovich had assumed that iMessage would be a more scrutinized and locked-down target, but when she started reverse engineering and looking for flaws, she quickly found multiple exploitable bugs.<\/p>\n<p class=\"paywall\">This may be because iMessage is such a complex platform that offers an array of communication options and features. It encompasses Animojis, rendering files like photos and videos, and integration with other apps\u2014everything from Apple Pay and iTunes to Fandango and Airbnb. All of these extensions and interconnections increase the likelihood of mistakes and weaknesses.<\/p>\n<p class=\"paywall\">One of the most interesting interaction-less bugs Silvanovich found was a fundamental logic issue that could have allowed a hacker to easily extract data from a user\u2019s messages. An attacker could send a specially crafted text message to a target, and the iMessage server would send specific user data back, like the content of their SMS messages or images. The victim wouldn&#x27;t even have to open their iMessage app for the attack to work. iOS has protections in place that would usually block an attack like this, but because it takes advantage of the system&#x27;s underlying logic, iOS\u2019 defenses interpret it as legitimate and intended.<\/p>\n<p class=\"paywall\">Other bugs Silvanovich found could lead to malicious code being placed on a victim&#x27;s device, again from just an incoming text.<\/p>\n<p><iframe loading=\"lazy\"  src=\"https:\/\/www.youtube.com\/embed\/kH4rZwjCpXY\" width=\"100%\" height=\"420\" frameborder=\"0\" ><\/iframe> <\/p>\n<p class=\"paywall\">Interaction-less iOS bugs are highly coveted by exploit vendors and nation-state hackers, because they make it so easy to compromise a target&#x27;s device without requiring any buy-in from the victim. The six vulnerabilities Silvanovich found\u2014with more yet to be announced\u2014would potentially be worth millions or even tens of millions of dollars on the exploit market.<\/p>\n<p class=\"paywall\">\u201cBugs like this haven\u2019t been made public for a long time,\u201d Silvanovich says. \u201cThere\u2019s a lot of additional attack surface in programs like iMessage. The individual bugs are reasonably easy to patch, but you can never find all the bugs in software, and every library you use will become an attack surface. So that design problem is relatively difficult to fix.\u201d<\/p>\n<p class=\"paywall\">Silvanovich emphasizes that the security of iMessage is strong overall, and that Apple is far from the only developer that sometimes make mistakes in grappling with this conceptual issue. Apple did not return a request from WIRED for comment.<\/p>\n<p>&quot;It doesn\u2019t matter how good your crypto is if the program has bugs on the receiving end.&quot;<\/p>\n<p name=\"inset-left\" class=\"inset-left-component__el\">Natalie Silvanovich, Google Project Zero<\/p>\n<p class=\"paywall\">Silvanovich says she also looked for interaction-less bugs in Android, but hasn\u2019t found any so far. She notes, though, that it\u2019s likely that such vulnerabilities exist in almost any target. Over the past year she\u2019s found similar flaws in WhatsApp, FaceTime, and the video conferencing protocol webRTC.<\/p>\n<p class=\"paywall\">\u201cMaybe this is an area that gets missed in security,\u201d Silvanovich says. \u201cThere\u2019s a huge amount of focus on implementation of protections like cryptography, but it doesn\u2019t matter how good your crypto is if the program has bugs on the receiving end.\u201d<\/p>\n<p class=\"paywall\">The best thing you can do to protect yourself against interaction-less attacks is keep your phone operating system and apps updated; Apple patched all six of the iMessage bugs Silvanovich is presenting in the <a href=\"https:\/\/support.apple.com\/en-us\/HT210346\" target=\"_blank\">recently released iOS 12.4<\/a>, and in <a href=\"https:\/\/support.apple.com\/en-us\/HT210348\" target=\"_blank\">macOS 10.14.6<\/a>. But beyond that, it\u2019s up to developers to avoid introducing these types of bugs in their code, or spot them as quickly as possible. Given how inexorable interaction-less attacks can be, there\u2019s not a lot users can do to stop them once malicious messages or calls start pouring in.<\/p>\n<p class=\"related-cne-video-component__dek\">It\u2019s time to start using an encrypted messaging app. Why? Using end-to-end encryption means that no one can see what you\u2019re sharing back and forth.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/imessage-interactionless-hacks-google-project-zero\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5d4b3bee75777400081f29e7\/master\/pass\/security%20-%20imessage%20hack%20v2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Wed, 07 Aug 2019 21:07:26 +0000<\/strong><\/p>\n<p>You don&#8217;t even have to click anything.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21358],"class_list":["post-16030","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-cyberattacks-and-hacks"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16030","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16030"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16030\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16030"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16030"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16030"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}