{"id":19434,"date":"2022-06-24T10:30:18","date_gmt":"2022-06-24T18:30:18","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/06\/24\/news-13167\/"},"modified":"2022-06-24T10:30:18","modified_gmt":"2022-06-24T18:30:18","slug":"news-13167","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/06\/24\/news-13167\/","title":{"rendered":"The surveillance-as-a-service industry needs to be brought to heel"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2018\/02\/linux_security_vs_macos_and_windows_locks_data_thinkstock-100748607-large.3x2.jpg?auto=webp&amp;quality=85,70\"\/><\/p>\n<p><strong>Credit to Author: Jonny Evans| Date: Fri, 24 Jun 2022 09:40:00 -0700<\/strong><\/p>\n<p>Here we go again: <a href=\"https:\/\/www.computerworld.com\/article\/3665050\/italian-spyware-firm-is-hacking-into-ios-and-android-devices-google-says.html\">another example of government surveillance involving smartphones<\/a> from Apple and Google has emerged, and it shows how sophisticated government-backed attacks can become and why there&#8217;s justification for keeping mobile platforms utterly locked down.<\/p>\n<p>I don\u2019t intend to focus too much on the news, but in brief it is as follows:<\/p>\n<p>The attack works like this: The target is sent a unique link that aims to trick them into downloading and installing a malicious app. In some cases, the spooks worked with an ISP to disable data connectivity to trick targets into downloading the app to recover that connection.<\/p>\n<p>The zero-day exploits used in these attacks have been fixed by Apple. It had\u00a0previously warned that bad actors have been <a href=\"https:\/\/www.apple.com\/privacy\/docs\/Building_a_Trusted_Ecosystem_for_Millions_of_Apps_A_Threat_Analysis_of_Sideloading.pdf\" rel=\"noopener nofollow\" target=\"_blank\">abusing its systems that let businesses distribute apps in-house<\/a>. The revelations tie in with recent news from Lookout Labs of enterprise-grade Android spyware called Hermit.<\/p>\n<p>The problem here is that surveillance technologies such as these have been commercialized. It means capabilities that historically have only been available to governments are also being used by private contractors. And that represents a risk, as highly confidential tools may be revealed, exploited, reverse-engineered and abused.<\/p>\n<p>As\u00a0<a href=\"https:\/\/blog.google\/threat-analysis-group\/italian-spyware-vendor-targets-users-in-italy-and-kazakhstan\/\" rel=\"noopener nofollow\" target=\"_blank\">Google said<\/a>:\u00a0\u201cOur findings underscore the extent to which commercial surveillance vendors have proliferated capabilities historically only used by governments with the technical expertise to develop and operationalize exploits. This makes the Internet less safe and threatens the trust on which users depend.\u201d<\/p>\n<p>Not only this, but these private surveillance companies are enabling dangerous hacking tools to proliferate, while giving these high-tech snooping facilities available to governments \u2014 some of which seem to enjoy spying on dissidents, journalists, political opponents, and human rights workers.\u00a0<\/p>\n<p>An even bigger danger is that Google is already tracking at least 30 spyware makers, which suggests the commercial surveillance-as-a-service industry is strong.\u00a0It also means that it&#8217;s now theoretically possible for even the least credible government to access tools for such purposes \u2014 and given so many of the identified threats make use of exploits identified by cybercriminals, it seems logical to think this is another income stream that encourages malicious research.<\/p>\n<p>The problem: these close-seeming links between purveyors of privatized surveillance and cybercrime won\u2019t always work in one direction.\u00a0Those exploits \u2014 at least some of which appear to be sufficiently difficult to discover that only governments would have the resources to be able to do so \u2014 will eventually leak.<\/p>\n<p>And while Apple, Google, and everyone else remain committed to a cat-and-mouse game to prevent such criminality, closing exploits where they can, the risk is that any government-mandated back door or device security flaw will eventually slip into the commercial markets, from which it will reach the criminal ones.<\/p>\n<p>Europe\u2019s Data Protection regulator warned: \u201cRevelations made about the Pegasus spyware raised very serious questions about the possible impact of modern spyware tools on fundamental rights, and particularly on the rights to privacy and data protection.\u201d<\/p>\n<p>That\u2019s not to say there aren\u2019t legitimate reasons for security research.\u00a0Flaws exist in any system, and we need people to be motivated to identify them; security updates wouldn\u2019t exist at all without the efforts of security researchers of various kinds. Apple <a href=\"https:\/\/developer.apple.com\/security-bounty\/\" rel=\"noopener nofollow\" target=\"_blank\">pays up to six-figures<\/a> to researchers who identify vulnerabilities in its systems.<\/p>\n<p>The EU\u2019s data protection supervisor called for a ban on the use of <a href=\"https:\/\/www.computerworld.com\/article\/3641261\/apple-pulls-no-punches-in-lawsuit-against-amoral-nso-group.html\">NSO Group\u2019s infamous Pegasus software<\/a> earlier this year. In fact, the call went further, outright seeking a \u201cban on the development and deployment of spyware with the capability of Pegasus.&#8221;<\/p>\n<p>NSO Group is now apparently\u00a0<a href=\"https:\/\/www.ft.com\/content\/371b4adf-39f4-4c72-bee7-bf440f252b5a\" rel=\"noopener nofollow\" target=\"_blank\">up for sale<\/a>.<\/p>\n<p>The <a href=\"https:\/\/www.europarl.europa.eu\/RegData\/etudes\/IDAN\/2022\/732268\/IPOL_IDA(2022)732268_EN.pdf\" rel=\"noopener nofollow\" target=\"_blank\">EU also said<\/a> that in the event such exploits were used in exceptional situations, such use should require companies <a href=\"https:\/\/www.computerworld.com\/article\/3625871\/iphone-spyware-its-a-dirty-job-but-nsos-gonna-do-it.html\">such as NSO<\/a> are made subject themselves to regulatory oversight.\u00a0As part of that, they must respect EU law, judicial review, criminal procedural rights and agree to no import of illegal intelligence, no political abuse of national security and to support civil society.<\/p>\n<p>In other words, these companies need bringing into line.<\/p>\n<p>Following revelations about NSO Group last year, Apple\u00a0<a href=\"https:\/\/support.apple.com\/en-us\/HT212960\" rel=\"noopener nofollow\" target=\"_blank\">published the following best practice recommendations<\/a> to help mitigate against such risks.<\/p>\n<p><em>Please follow me on\u00a0<a href=\"https:\/\/twitter.com\/jonnyevans_cw\" rel=\"nofollow noopener\" target=\"_blank\">Twitter<\/a>, or join me in the\u00a0<a href=\"https:\/\/mewe.com\/join\/appleholics_bar_and_grill\" rel=\"nofollow noopener\" target=\"_blank\">AppleHolic\u2019s bar &amp; grill<\/a>\u00a0and\u00a0<a href=\"https:\/\/mewe.com\/join\/apple_discussions\" rel=\"nofollow noopener\" target=\"_blank\">Apple Discussions<\/a>\u00a0groups on MeWe.<\/em><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3665052\/the-surveillance-as-a-service-industry-needs-to-be-brought-to-heel.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2018\/02\/linux_security_vs_macos_and_windows_locks_data_thinkstock-100748607-large.3x2.jpg?auto=webp&amp;quality=85,70\"\/><\/p>\n<p><strong>Credit to Author: Jonny Evans| Date: Fri, 24 Jun 2022 09:40:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>Here we go again: <a href=\"https:\/\/www.computerworld.com\/article\/3665050\/italian-spyware-firm-is-hacking-into-ios-and-android-devices-google-says.html\">another example of government surveillance involving smartphones<\/a> from Apple and Google has emerged, and it shows how sophisticated government-backed attacks can become and why there&#8217;s justification for keeping mobile platforms utterly locked down.<\/p>\n<h2><strong>What has happened?<\/strong><\/h2>\n<p>I don\u2019t intend to focus too much on the news, but in brief it is as follows:<\/p>\n<ul>\n<li>Google\u2019s Threat Analysis Group has <a href=\"https:\/\/blog.google\/threat-analysis-group\/italian-spyware-vendor-targets-users-in-italy-and-kazakhstan\/\" rel=\"noopener nofollow\" target=\"_blank\">published information revealing the hack<\/a>.<\/li>\n<li>Italian surveillance firm RCS Labs created the attack.<\/li>\n<li>The attack has been used in Italy and Kazakhstan, and possibly elsewhere.<\/li>\n<li>Some generations of the attack are wielded with help from ISPs.<\/li>\n<li>On iOS, attackers abused Apple\u2019s enterprise certification tools that enable in-house app deployment.<\/li>\n<li>Around nine different attacks were used.<\/li>\n<\/ul>\n<p>The attack works like this: The target is sent a unique link that aims to trick them into downloading and installing a malicious app. In some cases, the spooks worked with an ISP to disable data connectivity to trick targets into downloading the app to recover that connection.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3665052\/the-surveillance-as-a-service-industry-needs-to-be-brought-to-heel.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[10462,2211,10480,10554,714,24580],"class_list":["post-19434","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-android","tag-apple","tag-ios","tag-mobile","tag-security","tag-small-and-medium-business"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19434","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19434"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19434\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19434"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19434"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19434"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}