{"id":14436,"date":"2019-01-29T10:45:12","date_gmt":"2019-01-29T18:45:12","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/01\/29\/news-8188\/"},"modified":"2019-01-29T10:45:12","modified_gmt":"2019-01-29T18:45:12","slug":"news-8188","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2019\/01\/29\/news-8188\/","title":{"rendered":"Apple Takes Drastic Measures to Stop a Nasty FaceTime Bug"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5c5081dd45e0ae2c6bccfb6e\/master\/pass\/Security_Facetime-bug-group-chat-967379156.jpg\"\/><\/p>\n<p><strong>Credit to Author: Brian Barrett| Date: Tue, 29 Jan 2019 15:28:12 +0000<\/strong><\/p>\n<p><span class=\"lede\">It\u2019s often hard <\/span>to tell just how seriously to take reports of a new vulnerability. The <a href=\"http:\/\/www.wired.com\/tag\/hacker-lexicon\">jargon<\/a> is inscrutable, and the skills needed to pull off the attacks are possessed only by highly skilled professionals. But a bug afflicting Apple\u2019s FaceTime chat has no such ambiguity. How bad is it? Rather than risk exposing people to it, Apple pulled the plug on <a href=\"https:\/\/www.wired.com\/gallery\/everything-apple-announced-wwdc-2018\/\">FaceTime group chats<\/a> altogether.<\/p>\n<p>Unlike other high-profile gaffes, what makes this bug so alarming isn\u2019t the depth of knowledge someone could glean by exploiting it. It doesn\u2019t give hackers access to your emails or banking information. Instead, it lets a FaceTime caller listen in on whatever\u2019s happening on the other end of the line\u2014before the recipient answers the phone. With a few extra steps, they could trigger a video feed as well.<\/p>\n<p class=\"paywall\">The exploit was also relatively simple to pull off. All someone had to do to trigger the illicit audio was start a normal FaceTime call, then quickly add their own number as a third person in a group chat. If the person you were calling pressed the power button from their iOS lock screen, they would have transmitted both video and audio. The bug <a href=\"https:\/\/9to5mac.com\/2019\/01\/28\/facetime-bug-hear-audio\/\" target=\"_blank\">was first reported<\/a> on Monday by Apple-focused news site 9to5Mac.<\/p>\n<p class=\"paywall\">The implications are clear. While it\u2019s not the sort of high-wire attack you\u2019d find a nation state trying to pull off to steal intel secrets, it has deep potential consequences on a personal level. Even a few seconds of eavesdropping on an unguarded moment\u2014especially when the target is deciding whether to pick up your call\u2014is an unacceptable breach of privacy.<\/p>\n<p class=\"paywall\">\u201cWe\u2019re aware of this issue and we have identified a fix that will be released in a software update later this week,\u201d Apple said in a statement.<\/p>\n<p class=\"paywall\">But rather than wait for that fix to come around, as generally is the case, Apple took the additional step of shutting down group FaceTime chats altogether in the interim. It appears to be the first time the company has taken such aggressive steps to quash a software issue. The combination of high stakes and low barriers apparently made it not worth the risk.<\/p>\n<p class=\"paywall\">Apple had a <a href=\"https:\/\/www.wired.com\/story\/apples-security-macos-high-sierra-ios-11\/\">rocky year of security stumbles in 2017<\/a>, including a macOS High Sierra bug that <a href=\"https:\/\/www.wired.com\/story\/macos-high-sierra-hack-root\/\">let anyone gain root access<\/a> to a Mac by simply using the password \u201croot.\u201d But Apple regrouped last year, focusing on stability improvements <a href=\"https:\/\/www.wired.com\/story\/wwdc-2018-keynote-security-bug-fixes\/\">rather than flashy new features<\/a>, a gambit that appears to have largely paid off.<\/p>\n<p class=\"paywall\">Group FaceTime chats, which were also introduced last year, have not gone so smoothly. Last fall, security researcher Jose Rodriguez used a flaw in the new function to <a href=\"https:\/\/www.wired.com\/story\/turn-off-siri-lock-screen-attacks\/\">bypass the iOS lock screen<\/a> and view someone\u2019s entire address book. The two issues appear to be unrelated but speak to Apple&#x27;s continued need to more rigorously vet new software pushes.<\/p>\n<p class=\"paywall\">&quot;We have not had the time to dig in and reverse-engineer the root cause of this bug yet, but there is no specific or special reason this would occur,&quot; says Will Strafach, an iOS security researcher and the president of Sudo Security Group. &quot;It seems to be most likely an unfortunate chain of bad programming logic coded into the process for group FaceTime handling.&quot;<\/p>\n<p class=\"paywall\">The best thing you can do for now? Well, nothing, really, given that Apple has already voided the issue. But do install that software update as soon as it comes through, whenever it does. In the meantime, there are <a href=\"https:\/\/www.wired.com\/story\/best-group-video-chat-apps\/\">other group chat apps<\/a> to tide you over. And take this whole ordeal as a not-so-gentle reminder that your smartphone has a microphone and a camera on it, and so does your computer, and maybe it\u2019s healthy not to trust all of those implicitly.<\/p>\n<p class=\"paywall\"><em>Additional reporting by Lauren Goode.<\/em><\/p>\n<p class=\"paywall\"><em>This story has been updated to include comment from Will Strafach.<\/em><\/p>\n<p class=\"related-cne-video-component__dek\">It\u2019s 2017! It\u2019s time to start using an encrypted messaging app. Why? Using end-to-end encryption means that no one can see what you\u2019re sharing back and forth.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/apple-facetime-bug-group-chats\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5c5081dd45e0ae2c6bccfb6e\/master\/pass\/Security_Facetime-bug-group-chat-967379156.jpg\"\/><\/p>\n<p><strong>Credit to Author: Brian Barrett| Date: Tue, 29 Jan 2019 15:28:12 +0000<\/strong><\/p>\n<p>Group FaceTime chats let people eavesdrop on whoever they called, a bug so bad that Apple pulled the plug until it comes up with a fix.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714],"class_list":["post-14436","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14436","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=14436"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14436\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=14436"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=14436"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=14436"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}