{"id":19427,"date":"2022-06-23T10:45:21","date_gmt":"2022-06-23T18:45:21","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/06\/23\/news-13160\/"},"modified":"2022-06-23T10:45:21","modified_gmt":"2022-06-23T18:45:21","slug":"news-13160","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/06\/23\/news-13160\/","title":{"rendered":"Google Warns of New Spyware Targeting iOS and Android Users"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/62b490f0cf5463e00aca58a3\/master\/pass\/GettyImages-1256969622.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Thu, 23 Jun 2022 17:30:32 +0000<\/strong><\/p>\n<p class=\"BylineWrapper-iiTsTb hAGfXd byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-dbkCxf erRIa-D\"><span data-testid=\"BylineName\" class=\"BylineName-cKXFOb UCAzg byline__name\"><a class=\"BaseWrap-sc-TURhJ BaseText-fFzBQt BaseLink-gZQqBA BylineLink-eZnyPI eTiIvU mEZDb fNdcwQ bKZMMS byline__name-link button\" href=\"\/author\/lily-hay-newman\">Lily Hay Newman<\/a><\/span><\/span><\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p><span class=\"lead-in-text-callout\">In hearings this<\/span> week, the notorious spyware vendor NSO group told European legislators that at least five EU countries have used its powerful Pegasus surveillance malware. But as ever more comes to light about the reality of how NSO&#x27;s products have been abused around the world, researchers are also working to raise awareness that the surveillance-for-hire industry goes far beyond one company. On Thursday, Google&#x27;s Threat Analysis Group and Project Zero vulnerability analysis team <a data-offer-url=\"https:\/\/blog.google\/threat-analysis-group\/italian-spyware-vendor-targets-users-in-italy-and-kazakhstan\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/blog.google\/threat-analysis-group\/italian-spyware-vendor-targets-users-in-italy-and-kazakhstan\/&quot;}\" href=\"https:\/\/blog.google\/threat-analysis-group\/italian-spyware-vendor-targets-users-in-italy-and-kazakhstan\/\" rel=\"nofollow noopener\" target=\"_blank\">publish<\/a>ed <a data-offer-url=\"https:\/\/googleprojectzero.blogspot.com\/2022\/06\/curious-case-carrier-app.html\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/googleprojectzero.blogspot.com\/2022\/06\/curious-case-carrier-app.html&quot;}\" href=\"https:\/\/googleprojectzero.blogspot.com\/2022\/06\/curious-case-carrier-app.html\" rel=\"nofollow noopener\" target=\"_blank\">findings<\/a> about the iOS version of a spyware product attributed to the Italian developer RCS Labs.<\/p>\n<p class=\"paywall\">Google researchers say they detected victims of the spyware in Italy and Kazakhstan on both Android and iOS devices. Last week, the security firm Lookout <a data-offer-url=\"https:\/\/www.lookout.com\/blog\/hermit-spyware-discovery\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.lookout.com\/blog\/hermit-spyware-discovery&quot;}\" href=\"https:\/\/www.lookout.com\/blog\/hermit-spyware-discovery\" rel=\"nofollow noopener\" target=\"_blank\">published findings<\/a> about the Android version of the spyware, which it calls \u201cHermit\u201d and also attributes to RCS Labs. Lookout notes that Italian officials <a data-offer-url=\"https:\/\/www.camera.it\/Leg18\/410?idSeduta=0494&amp;tipo=atti_indirizzo_controllo&amp;C1f3C_proxy_auth_state=C1f3C_resume&amp;C1f3C_proxy_auth_id=BRK8NSUKgPgVEAfjonN3zt&amp;utm_source=blog&amp;utm_medium=web\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.camera.it\/Leg18\/410?idSeduta=0494&amp;tipo=atti_indirizzo_controllo&amp;C1f3C_proxy_auth_state=C1f3C_resume&amp;C1f3C_proxy_auth_id=BRK8NSUKgPgVEAfjonN3zt&amp;utm_source=blog&amp;utm_medium=web&quot;}\" href=\"https:\/\/www.camera.it\/Leg18\/410?idSeduta=0494&amp;tipo=atti_indirizzo_controllo&amp;C1f3C_proxy_auth_state=C1f3C_resume&amp;C1f3C_proxy_auth_id=BRK8NSUKgPgVEAfjonN3zt&amp;utm_source=blog&amp;utm_medium=web\" rel=\"nofollow noopener\" target=\"_blank\">used a version of the spyware<\/a> during a 2019 anti-corruption probe. In addition to victims located in Italy and Kazakhstan, Lookout also found data indicating that an unidentified entity used the spyware for targeting in northeastern Syria.<\/p>\n<p class=\"paywall\">\u201cGoogle has been tracking the activities of commercial spyware vendors for years, and in that time we have seen the industry rapidly expand from a few vendors to an entire ecosystem,\u201d TAG security engineer Clement Lecigne tells WIRED. \u201cThese vendors are enabling the proliferation of dangerous hacking tools, arming governments that would not be able to develop these capabilities in-house. But there is little or no transparency into this industry, that&#x27;s why it&#x27;s critical to share information about these vendors and their capabilities.\u201d<\/p>\n<p>TAG says it currently tracks more than 30 spyware makers that offer an array of technical capabilities and levels of sophistication to government-backed clients.<\/p>\n<p class=\"paywall\">In their analysis of the iOS version, Google researchers found that attackers distributed the iOS spyware using a fake app meant to look like the My Vodafone app from the popular international mobile carrier. In both Android and iOS attacks, attackers may have simply tricked targets into downloading what appeared to be a messaging app by distributing a malicious link for victims to click. But in some particularly dramatic cases of iOS targeting, Google found that attackers may have been working with local ISPs to cut off a specific user&#x27;s mobile data connection, send them a malicious download link over SMS, and convince them to install the fake My Vodafone app over Wi-Fi with the promise that this would restore their cell service.<\/p>\n<p class=\"paywall\">Attackers were able to distribute the malicious app because RCS Labs had registered with Apple&#x27;s Enterprise Developer Program, apparently through a shell company called 3-1 Mobile SRL, to obtain a certificate that allows them to sideload apps without going through Apple&#x27;s typical AppStore review process.<\/p>\n<p class=\"paywall\">Apple tells WIRED that all of the known accounts and certificates associated with the spyware campaign have been revoked.\u00a0<\/p>\n<p class=\"paywall\">\u201cEnterprise certificates are meant only for internal use by a company, and are not intended for general app distribution, as they can be used to circumvent App Store and iOS protections,\u201d the company wrote in an October <a data-offer-url=\"https:\/\/www.apple.com\/privacy\/docs\/Building_a_Trusted_Ecosystem_for_Millions_of_Apps_A_Threat_Analysis_of_Sideloading.pdf\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.apple.com\/privacy\/docs\/Building_a_Trusted_Ecosystem_for_Millions_of_Apps_A_Threat_Analysis_of_Sideloading.pdf&quot;}\" href=\"https:\/\/www.apple.com\/privacy\/docs\/Building_a_Trusted_Ecosystem_for_Millions_of_Apps_A_Threat_Analysis_of_Sideloading.pdf\" rel=\"nofollow noopener\" target=\"_blank\">report<\/a> about sideloading. \u201cDespite the program\u2019s tight controls and limited scale, bad actors have found unauthorized ways of accessing it, for instance by purchasing enterprise certificates on the black market.\u201d<\/p>\n<p class=\"paywall\">Project Zero member Ian Beer conducted a technical analysis of the exploits used in the RCS Labs iOS malware. He notes that the spyware uses a total of six exploits to gain access to surveil a victim&#x27;s device. While five are known and publicly circulating exploits for older iOS versions, the sixth was an unknown vulnerability at the time it was discovered. (Apple <a data-offer-url=\"https:\/\/support.apple.com\/en-us\/HT212976\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/support.apple.com\/en-us\/HT212976&quot;}\" href=\"https:\/\/support.apple.com\/en-us\/HT212976\" rel=\"nofollow noopener\" target=\"_blank\">patched<\/a> that vulnerability in December.) That exploit took advantage of structural changes in how data flows across Apple&#x27;s new generations of \u201ccoprocessors\u201d as the company, and the industry overall, moves toward the all-in-one \u201csystem-on-a-chip\u201d design.<\/p>\n<p class=\"paywall\">The exploit isn&#x27;t unprecedented in its sophistication, but Google researchers note that the RCS Labs spyware reflects a broader trend in which the surveillance-for-hire industry combines existing hacking techniques and exploits with more novel elements to gain the upper hand.\u00a0<\/p>\n<p class=\"paywall\">\u201cThe commercial surveillance industry benefits from and reuses research from the jailbreaking community. In this case, three out of six of the exploits are from public jailbreak exploits,\u201d TAG member Benoit Sevens says. \u201cWe also see other surveillance vendors reusing techniques and infection vectors initially used and discovered by cyber crime groups. And like other attackers, surveillance vendors are not only using sophisticated exploits but are using social engineering attacks to lure their victims in.\u201d<\/p>\n<p class=\"paywall\">The research shows that while not all actors are as successful or well known as a company like NSO Group, many small and midsize players together in a burgeoning industry are creating real risk for internet users worldwide.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/hermit-spyware-rcs-labs\/\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/62b490f0cf5463e00aca58a3\/master\/pass\/GettyImages-1256969622.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Thu, 23 Jun 2022 17:30:32 +0000<\/strong><\/p>\n<p>The spyware has been used to target people in Italy, Kazakhstan, and Syria, researchers at Google and Lookout have found.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21358,21357],"class_list":["post-19427","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-cyberattacks-and-hacks","tag-security-security-news"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19427","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19427"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19427\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19427"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19427"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19427"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}