{"id":17514,"date":"2020-01-22T10:45:46","date_gmt":"2020-01-22T18:45:46","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2020\/01\/22\/news-11249\/"},"modified":"2020-01-22T10:45:46","modified_gmt":"2020-01-22T18:45:46","slug":"news-11249","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2020\/01\/22\/news-11249\/","title":{"rendered":"Everything We Know About the Jeff Bezos Phone Hack"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5e2869dad5c9600008515680\/master\/pass\/Sec-bezos-1169506489.jpg\"\/><\/p>\n<p><strong>Credit to Author: Louise Matsakis, Lily Hay Newman| Date: Wed, 22 Jan 2020 17:19:43 +0000<\/strong><\/p>\n<p class=\"byline bylines__byline byline--author\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\"><span class=\"byline__name byline--with-bg\"><a class=\"byline__name-link\" href=\"\/contributor\/louise-matsakis\">Louise Matsaki<span class=\"link__last-letter-spacing\">s<\/span><\/a><\/span> <span class=\"byline__name byline--with-bg\"><a class=\"byline__name-link\" href=\"\/contributor\/lily-hay-newman\">Lily Hay Newma<span class=\"link__last-letter-spacing\">n<\/span><\/a><\/span> <\/span><\/p>\n<p class=\"content-header__row content-header__dek\">A UN report links the attack on Jeff Bezos&#39;s iPhone X directly to Saudi Arabian crown prince Mohammed bin Salman.<\/p>\n<p>On November 8, 2018, Amazon CEO Jeff Bezos received an unexpected text message over WhatsApp from Saudi Arabian leader Mohammed bin Salman. The two had exchanged numbers a few months prior, in April, at a small dinner in Los Angeles, but weren\u2019t in regular contact; Bezos had previously received only a video file from the crown prince in May that <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.washingtonpost.com\/politics\/un-ties-alleged-phone-hacking-to-posts-coverage-of-saudi-arabia\/2020\/01\/22\/a0bc63ba-3d1f-11ea-b90d-5652806c3b3a_story.html&quot;}\" href=\"https:\/\/www.washingtonpost.com\/politics\/un-ties-alleged-phone-hacking-to-posts-coverage-of-saudi-arabia\/2020\/01\/22\/a0bc63ba-3d1f-11ea-b90d-5652806c3b3a_story.html\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">reportedly extolled Saudi Arabia\u2019s economy<\/a>. The November text had an attachment as well: an image of a woman who looked like Lauren Sanchez, with whom <a href=\"https:\/\/www.wired.com\/story\/jeff-bezos-legal-case-national-enquirer\/\">Bezos had been having<\/a> an unreported affair.<\/p>\n<p>That message appears to have been a taunt; American Media Inc., publisher of <em>The National Inquirer<\/em>, would several months later make <a href=\"https:\/\/www.wired.com\/story\/jeff-bezos-legal-case-national-enquirer\/\">details of the affair<\/a> public. But it\u2019s the initial contact in May that has set off another firestorm with MBS at the center. That video file was loaded with malware, investigators now say. The crown prince\u2019s own account had been used to hack Bezos\u2019s phone.<\/p>\n<p>Such brazen targeting of a private citizen\u2014the richest man in the world, no less\u2014is alarming to say the least. It underscores the dangers of an unchecked private market for digital surveillance, and raises serious questions about other prominent US figures who have known relationships with the crown prince, like White House advisor Jared Kushner and President Donald Trump himself.<\/p>\n<p>\u201cThis reported surveillance of Mr. Bezos, allegedly through software developed and marketed by a private company and transferred to a government without judicial control of its use, is, if true, a concrete example of the harms that result from the unconstrained marketing, sale, and use of spyware,\u201d United Nations special rapporteurs David Kaye and Agnes Callamard said in a statement. Details provided by the UN suggest that the malware originated from a private vendor, such as Israel\u2019s NSO Group or the Italian <a href=\"https:\/\/www.wired.com\/2015\/07\/hacking-team-shows-world-not-stockpile-exploits\/\">Hacking Team<\/a>. The tie to MBS was <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.theguardian.com\/technology\/2020\/jan\/21\/amazon-boss-jeff-bezoss-phone-hacked-by-saudi-crown-prince&quot;}\" href=\"https:\/\/www.theguardian.com\/technology\/2020\/jan\/21\/amazon-boss-jeff-bezoss-phone-hacked-by-saudi-crown-prince\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">first reported Tuesday by <em>The Guardian<\/em><\/a>.<\/p>\n<p>&quot;It sounds like whatever implant they had self-destructed.&quot;<\/p>\n<p>Former NSA Analyst Dave Aitel<\/p>\n<p>Bezos became a Saudi target not because of Amazon, but <a href=\"https:\/\/www.wired.com\/2013\/08\/bezos-amazon-washington-post\/\">his ownership<\/a> of <em>The Washington Post<\/em>, which had published a series of critical stories about the kingdom. The November text from MBS came one month after Saudi officials murdered <em>Post<\/em> columnist and Saudi dissident Jamal Khashoggi inside the country\u2019s Istanbul consulate. The UN probe into the attack on Bezos is based at least in part on a <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.vice.com\/en_us\/article\/v74v34\/saudi-arabia-hacked-jeff-bezos-phone-technical-report&quot;}\" href=\"https:\/\/www.vice.com\/en_us\/article\/v74v34\/saudi-arabia-hacked-jeff-bezos-phone-technical-report\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">forensics analysis<\/a> commissioned by Bezos himself and completed by FTI Consulting, a cybersecurity consulting firm.The findings are not definitive, and the firm ranked them at medium to high confidence. Similarly, the UN made clear that while its investigation indicated these results, attribution is not certain.<\/p>\n<p>\u201cAll FTI Consulting client work is confidential. We do not comment on, confirm or deny client engagements or potential engagements,\u201d the firm told WIRED in a statement.<\/p>\n<p>The Saudi Embassy denied the allegations <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/twitter.com\/SaudiEmbassyUSA\/status\/1219792870389035008&quot;}\" href=\"https:\/\/twitter.com\/SaudiEmbassyUSA\/status\/1219792870389035008\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">on Twitter<\/a> Tuesday evening: \u201cRecent media reports that suggest the Kingdom is behind a hacking of Mr. Jeff Bezos&#x27; phone are absurd. We call for an investigation on these claims so that we can have all the facts out.\u201d<\/p>\n<p>According to the UN\u2019s findings, the Saudi regime began exfiltrating large amounts of data from Bezos within hours of sending the tainted MP4 video file. FTI Consulting found that six months before the video download, Bezos&#x27;s phone averaged about 430 kilobytes of data coming from the phone per day, a small amount. Within hours of receiving the video that number rose and the phone started averaging 101 megabytes for months afterward. The UN reports that this number sometimes even jumped into the gigabyte range, several orders of magnitude over the pre-hack baseline\u2014indicating data exfiltration through malware.<\/p>\n<p>The UN report points to <a href=\"https:\/\/www.wired.com\/2017\/04\/total-takeover-iphone-spyware-lurks-android\/\">Pegasus<\/a> malware, developed by the cyberarms dealer NSO Group, which has adapted it for use on numerous iOS and Android versions over the last four years. Saudi Arabia first bought Pegasus from NSO Group in November 2017, according to the UN. Investigators suggest Galileo, a Hacking Team product, as another possibility. <a href=\"https:\/\/www.wired.com\/2017\/04\/total-takeover-iphone-spyware-lurks-android\/\">Analysis<\/a> of those <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/securitylab.disi.unitn.it\/lib\/exe\/fetch.php?media=teaching:offtech:2015:reports:codeanalysis_hackingteam.pdf&quot;}\" href=\"https:\/\/securitylab.disi.unitn.it\/lib\/exe\/fetch.php?media=teaching:offtech:2015:reports:codeanalysis_hackingteam.pdf\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">tools<\/a> by third-party and academic researchers have shown that both are capable of compromising a device and accessing almost any data on it, from text messages, calls, contacts, and emails to apps, browsing history, and even location data.<\/p>\n<p>NSO Group denied in a statement that its tools were used in the attack. \u201cAs we stated unequivocally in April 2019 to the same false assertion, our technology was not used in this instance,&quot; the firm said. &quot;Our technology cannot be used on US phone numbers. Our products are only used to investigate terror and serious crime. Any suggestion that NSO is involved is defamatory.\u201d<\/p>\n<p>The UN alleges that during the same period that the Saudi regime had access to Bezos\u2019s phone, it also targeted Khashoggi\u2019s associates and other pro-human rights dissidents using mobile malware developed by NSO Group. The actions fit with Saudi Arabia\u2019s broader pattern of targeting activists. In November, the Justice Department <a href=\"https:\/\/www.wired.com\/story\/twitter-insiders-saudi-arabia-spy\/\">charged two Twitter employees<\/a> with abusing internal systems to steal information on Saudi Arabia\u2019s behalf.<\/p>\n<p>Saudi Arabia appears to have simultaneously also launched an online disinformation campaign to discredit Bezos. In November 2018, the top-trending hashtag on Twitter in Saudi Arabia was \u201cBoycott Amazon,\u201d the UN notes. The campaign abruptly stopped in April 2019, after an investigator working for Bezos <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.thedailybeast.com\/jeff-bezos-investigation-finds-the-saudis-obtained-his-private-information&quot;}\" href=\"https:\/\/www.thedailybeast.com\/jeff-bezos-investigation-finds-the-saudis-obtained-his-private-information\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">accused the Saudis<\/a> of hacking the executive\u2019s phone. It then picked up again in October, after Bezos attended a memorial event for Khashoggi.<\/p>\n<p>While private exploit brokers like NSO Group often describe themselves as forensic analysis firms, tools like Pegasus have a track record of being used for offensive hacking. In fact, analysts used such tools to analyze Bezos\u2019s phone in the wake of the breach. Doing so proved challenging, given the sophistication of the attack. By the time a \u201cphysical analyzer\u201d <a href=\"https:\/\/www.wired.com\/story\/cellebrite-ufed-ios-12-iphone-hack-android\/\">from the Israeli company Cellebrite<\/a> vetted the device, there were no traces of malware. An audit of nearly 300,000 directors, sub-directories, and file names similarly yielded no evidence <a href=\"https:\/\/www.wired.com\/story\/ios-exploit-jailbreak-iphone-ipad\/\">of iOS jailbreaking tools<\/a>.<\/p>\n<p>It was also difficult to analyze the video sent from the crown prince\u2019s account for signs of malware, because both the file itself and the downloader were encrypted. And the UN notes that WhatsApp\u2019s own end-to-end encryption also created challenges. Cellebrite\u2019s software platforms for analyzing device traffic and network logs did pinpoint, though, when Bezos\u2019s phone began hemorrhaging data.<\/p>\n<p>\u201cIt sounds like whatever implant they had self-destructed and wasn&#x27;t there when they went for the forensics,\u201d says Dave Aitel, chief security technology officer at the secure infrastructure firm Cyxtera and a former NSA analyst. \u201cIt seems about right that you would have a self-destruct capability on any real implant. And US investigators probably have other classified information that validates their attribution.\u201d<\/p>\n<p>That such a simple, elegant attack could snag Jeff Bezos underscores just how at-risk Trump has been.<\/p>\n<p>It\u2019s not clear what other information the hack may have gleaned about Bezos or Amazon\u2019s business. The incident also puts further scrutiny on an already controversial private cyberarms industry. At the end of October, WhatsApp and its owner Facebook <a href=\"https:\/\/www.wired.com\/story\/whatsapp-nso-group-lawsuit\/\">sued NSO Group<\/a> over alleged attacks on more than a thousand of its users\u2014a first effort to curb rampant growth of the private exploit industry. The <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/context-cdn.washingtonpost.com\/notes\/prod\/default\/documents\/bf5edf35-5672-49fa-aca1-edefadff683f\/note\/8ef25c0d-fee9-416a-b7f9-e0a4dedc66f2.pdf#page=1&quot;}\" href=\"https:\/\/context-cdn.washingtonpost.com\/notes\/prod\/default\/documents\/bf5edf35-5672-49fa-aca1-edefadff683f\/note\/8ef25c0d-fee9-416a-b7f9-e0a4dedc66f2.pdf#page=1\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">complaint noted<\/a> that at least some of NSO Group&#x27;s infrastructure is hosted by Amazon Web Services. Additionally, <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.facebook.com\/security\/advisories\/cve-2019-11931&quot;}\" href=\"https:\/\/www.facebook.com\/security\/advisories\/cve-2019-11931\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">Facebook patched<\/a> a vulnerability in November that &quot;could be triggered in WhatsApp by sending a specially crafted MP4 file to a WhatsApp user.&quot; It is unclear if this bug was exploited to target Bezos, but it\u2019s a reminder that such bugs can exist in even the most seemingly innocuous features of an app like WhatsApp.<\/p>\n<p>Saudi Arabia\u2019s apparent targeting of one of the world\u2019s most powerful businessmen raises questions about the kingdom\u2019s communications with US officials, including Jared Kushner, President Trump\u2019s son-in-law and adviser on the Middle East. Kushner has reportedly <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.nytimes.com\/2018\/12\/08\/world\/middleeast\/saudi-mbs-jared-kushner.html&quot;}\" href=\"https:\/\/www.nytimes.com\/2018\/12\/08\/world\/middleeast\/saudi-mbs-jared-kushner.html\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">exchanged personal messages<\/a> with MBS, and has been known <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.theguardian.com\/us-news\/2019\/mar\/21\/jared-kushner-whatsapp-house-oversight-information&quot;}\" href=\"https:\/\/www.theguardian.com\/us-news\/2019\/mar\/21\/jared-kushner-whatsapp-house-oversight-information\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">to use WhatsApp<\/a> to talk with foreign leaders. Kusher was issued a top-secret security clearance, even after <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.washingtonpost.com\/politics\/jared-kushner-identified-as-senior-white-house-official-whose-security-clearance-was-denied-by-career-officials\/2019\/04\/03\/fefa8dbe-5623-11e9-814f-e2f46684196e_story.html&quot;}\" href=\"https:\/\/www.washingtonpost.com\/politics\/jared-kushner-identified-as-senior-white-house-official-whose-security-clearance-was-denied-by-career-officials\/2019\/04\/03\/fefa8dbe-5623-11e9-814f-e2f46684196e_story.html\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">concerns were raised<\/a> by White House and intelligence officials about the risk of foreign influence.<\/p>\n<p>Meanwhile, President Donald Trump is known for using <a href=\"https:\/\/www.wired.com\/story\/trump-iphone-security-risk\/\">personal, consumer-grade smartphones<\/a>, resisting advice from the White House\u2019s IT and cybersecurity staff to use only a hardened device. That such a simple, elegant attack could snag Jeff Bezos underscores just how at-risk Trump has been. Countless actors around the world would want nothing more than unfettered access to his phone; all it would take to get it is making him click on a video or link.<\/p>\n<p>Though the incident will raise awareness about the growing threats of the private cyberarms industry and potential abuse of its products, it seems unlikely that it will come with any immediate reprisals. The UN says it will continue its investigations into both the Khashoggi murder and the rampant use of spyware; it seems there\u2019s no shortage of details still to uncover.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/bezos-phone-hack-mbs-saudi-arabia\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5e2869dad5c9600008515680\/master\/pass\/Sec-bezos-1169506489.jpg\"\/><\/p>\n<p><strong>Credit to Author: Louise Matsakis, Lily Hay Newman| Date: Wed, 22 Jan 2020 17:19:43 +0000<\/strong><\/p>\n<p>A UN report links the attack on Jeff Bezos&#8217;s iPhone X directly to Saudi Arabian crown prince Mohammed bin Salman.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21358],"class_list":["post-17514","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-cyberattacks-and-hacks"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17514","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17514"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17514\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17514"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17514"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17514"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}