{"id":18187,"date":"2022-02-03T10:30:08","date_gmt":"2022-02-03T18:30:08","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/02\/03\/news-11920\/"},"modified":"2022-02-03T10:30:08","modified_gmt":"2022-02-03T18:30:08","slug":"news-11920","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/02\/03\/news-11920\/","title":{"rendered":"Second Israeli firm accused of undermining iPhones, like NSO Group"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2020\/09\/group_of_anonymous_hooded_figures_hackers_bad_actors_security_threats_by_leo_lintang_gettyimages-1135437442_2400x1600-100858240-large.3x2.jpg?auto=webp&amp;quality=85,70\"\/><\/p>\n<p><strong>Credit to Author: Jonny Evans| Date: Thu, 03 Feb 2022 09:08:00 -0800<\/strong><\/p>\n<p>As if recent revelations about NSO Group weren\u2019t bad enough,<a href=\"https:\/\/www.reuters.com\/technology\/exclusive-iphone-flaw-exploited-by-second-israeli-spy-firm-sources-2022-02-03\/?rpc=401&amp;\" rel=\"noopener nofollow\" target=\"_blank\">\u00a0yet another Israeli firm<\/a>\u00a0\u2014 QuaDream \u2014 has now been accused of using the same hack to undermine iPhone security.<\/p>\n<p>A <em><a href=\"https:\/\/www.reuters.com\/technology\/exclusive-iphone-flaw-exploited-by-second-israeli-spy-firm-sources-2022-02-03\/?rpc=401&amp;\" rel=\"noopener nofollow\" target=\"_blank\">Reuters<\/a><\/em> report has the details:<\/p>\n<p>The news follows the revelation that the\u00a0<a href=\"https:\/\/www.theguardian.com\/news\/2022\/feb\/02\/fbi-confirms-it-obtained-nsos-pegasus-spyware\" rel=\"noopener nofollow\" target=\"_blank\">FBI also obtained NSO\u2019s Pegasus spyware<\/a>, but claims it did not use it. That \u00a0also follows another recent claim that NSO Group <a href=\"https:\/\/arstechnica.com\/tech-policy\/2022\/02\/report-nso-offered-us-firm-bags-of-cash-for-help-spying-on-cellphone-users\/\" rel=\"noopener nofollow\" target=\"_blank\">offered \u201cbags of cash\u201d<\/a> in exchange for access to US cellular networks via the <a href=\"https:\/\/people.cs.rutgers.edu\/~rmartin\/teaching\/fall04\/cs552\/readings\/ss7.pdf\" rel=\"noopener nofollow\" target=\"_blank\">SS7 network<\/a>.<\/p>\n<p>While we don\u2019t know if Apple is aware of the actions of QuaDream, how it responded to the NSO Group attack may be instructional. Apple closed the ForcedEntry vulnerability soon after it was revealed. The company later <a href=\"https:\/\/www.computerworld.com\/article\/3641261\/apple-pulls-no-punches-in-lawsuit-against-amoral-nso-group.html\">filed a lawsuit against NSO Group<\/a> saying the Israeli firm violated Apple\u2019s terms of use.<\/p>\n<p>Apple pulled no punches in its suit, which said:<\/p>\n<p>\u201cDefendants are notorious hackers \u2014 amoral 21st century mercenaries who have created highly sophisticated cyber-surveillance machinery that invites routine and flagrant abuse.\u201d<\/p>\n<p>Ivan Krsti\u0107, head of Apple Security Engineering and Architecture, said:<\/p>\n<p>\u201cOur threat intelligence and engineering teams work around the clock to analyze new threats, rapidly patch vulnerabilities, and develop industry-leading new protections in our software and silicon. Apple runs one of the most sophisticated security engineering operations in the world, and we will continue to work tirelessly to protect our users fromabusivestate-sponsored actorslike NSO Group.\u201d<\/p>\n<p>With that promise in mind, it\u2019s easy to imagine Apple will now litigate against QuaDream for its abuse of the same vulnerability.<\/p>\n<p>These attacks aren\u2019t cheap. <em><a href=\"https:\/\/www.reuters.com\/technology\/exclusive-iphone-flaw-exploited-by-second-israeli-spy-firm-sources-2022-02-03\/?rpc=401&amp;\" rel=\"noopener nofollow\" target=\"_blank\">Reuters<\/a> <\/em>cites prices of $2 million and above for access to them. That expense implies most users needn\u2019t worry at this time, particularly as Apple has now patched this vulnerability.<\/p>\n<p>Sadly, this does not mean criminal and state-sponsored hackers won\u2019t abuse other so-far-unknown ways to break into your digital lives. (They may be doing so already.)<\/p>\n<p>For now, Apple is <a href=\"https:\/\/www.applemust.com\/apple-notifies-nso-spyware-targets-across-multiple-nations\/\" rel=\"noopener nofollow\" target=\"_blank\">warning users<\/a> it identifies as having been hit by these hacks. Some of those affected include <a href=\"https:\/\/www.calcalistech.com\/ctech\/articles\/0,7340,L-3927410,00.html\" rel=\"noopener nofollow\" target=\"_blank\">Israeli citizens<\/a>, <a href=\"https:\/\/www.nytimes.com\/2021\/12\/03\/us\/politics\/phone-hack-nso-group-israel-uganda.html\" rel=\"noopener nofollow\" target=\"_blank\">US diplomats<\/a>, <a href=\"https:\/\/www.theguardian.com\/world\/2021\/jul\/18\/ft-editor-roula-khalaf-among-180-journalists-targeted-nso-spyware\" rel=\"noopener nofollow\" target=\"_blank\">journalists<\/a>, dissidents, and opposition leaders <a href=\"https:\/\/www.theguardian.com\/world\/2021\/jul\/18\/revealed-leak-uncovers-global-abuse-of-cyber-surveillance-weapon-nso-group-pegasus\" rel=\"noopener nofollow\" target=\"_blank\">in nations around the world<\/a>.<\/p>\n<p>\u201cMercenary spyware firms like NSO Group have facilitated some of the world\u2019s worst human rights abuses and acts of transnational repression, while enriching themselves and their investors,\u201d <a href=\"https:\/\/www.apple.com\/uk\/newsroom\/2021\/11\/apple-sues-nso-group-to-curb-the-abuse-of-state-sponsored-spyware\/\" rel=\"nofollow noopener\" target=\"_blank\">said Ron Deibert<\/a>, director of the Citizen Lab at the University of Toronto.<\/p>\n<p>NSO Group and an Israeli firm called Candiru have now been <a href=\"https:\/\/www.nytimes.com\/2021\/11\/03\/business\/nso-group-spyware-blacklist.html\" rel=\"noopener nofollow\" target=\"_blank\">banned in the US<\/a>. We don\u2019t know if QuaDream will be added to that list, but there are <a href=\"https:\/\/issues.org\/surveillance-spyware-uso-group-pegasus-citizen-lab\/\" rel=\"noopener nofollow\" target=\"_blank\">many other firms that also should be constrained<\/a>.<\/p>\n<p>The problem with attacks of this kind is that they are highly sophisticated, highly targeted, and, by their nature, hard to spot. They use unknown vulnerabilities to break into a device, and then try to take control of those devices.\u00a0Until the attack is identified, security researchers and platform providers remain unaware that a flaw exists, so they cannot protect against it.<\/p>\n<p>This is why Apple is <a href=\"https:\/\/www.computerworld.com\/article\/3641261\/apple-pulls-no-punches-in-lawsuit-against-amoral-nso-group.html\">contributing $10 million<\/a> to support security research and (I imagine) will probably increase that investment moving forward.<\/p>\n<p>Since the NSO Group attack was disclosed, Apple now provides <a href=\"https:\/\/support.apple.com\/en-us\/HT212960\" rel=\"noopener nofollow\" target=\"_blank\">threat notifications<\/a>. So if it spots activity it sees as consistent with a state-sponsored attack, it will send the user who has been attacked an email, an iMessage, and a notification on that person\u2019s Apple ID page.<\/p>\n<p>When it comes to general security tips, Apple\u2019s current advice is to:<\/p>\n<p>It is important to note that any move to <a href=\"https:\/\/www.computerworld.com\/article\/3640611\/no-sideloading-is-not-good-for-you.html\">permit side-loading of apps on Apple\u2019s platforms<\/a> will undermine this security and make it easier for groups such as NSO Group or QuaDream to break into your iPhone.<\/p>\n<p>Finally, if you think your device has been affected, one (not at all ideal) solution might be to return your device to factory settings and make use of a temporary SIM and a backup Apple ID pending review of your original files.<\/p>\n<p>Stay safe out there.<\/p>\n<p><em>Please follow me on\u00a0<a href=\"https:\/\/twitter.com\/jonnyevans_cw\" rel=\"nofollow noopener\" target=\"_blank\">Twitter<\/a>, or join me in the\u00a0<a href=\"https:\/\/mewe.com\/join\/appleholics_bar_and_grill\" rel=\"nofollow noopener\" target=\"_blank\">AppleHolic\u2019s bar &amp; grill<\/a>\u00a0and\u00a0<a href=\"https:\/\/mewe.com\/join\/apple_discussions\" rel=\"nofollow noopener\" target=\"_blank\">Apple Discussions<\/a>\u00a0groups on MeWe.<\/em><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3649208\/second-israeli-firm-accused-of-undermining-iphones-like-nso-group.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2020\/09\/group_of_anonymous_hooded_figures_hackers_bad_actors_security_threats_by_leo_lintang_gettyimages-1135437442_2400x1600-100858240-large.3x2.jpg?auto=webp&amp;quality=85,70\"\/><\/p>\n<p><strong>Credit to Author: Jonny Evans| Date: Thu, 03 Feb 2022 09:08:00 -0800<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>As if recent revelations about NSO Group weren\u2019t bad enough,<a href=\"https:\/\/www.reuters.com\/technology\/exclusive-iphone-flaw-exploited-by-second-israeli-spy-firm-sources-2022-02-03\/?rpc=401&amp;\" rel=\"noopener nofollow\" target=\"_blank\">\u00a0yet another Israeli firm<\/a>\u00a0\u2014 QuaDream \u2014 has now been accused of using the same hack to undermine iPhone security.<\/p>\n<h2><strong>QuaDream also used the hack, Reuters claims<\/strong><\/h2>\n<p>A <em><a href=\"https:\/\/www.reuters.com\/technology\/exclusive-iphone-flaw-exploited-by-second-israeli-spy-firm-sources-2022-02-03\/?rpc=401&amp;\" rel=\"noopener nofollow\" target=\"_blank\">Reuters<\/a><\/em> report has the details:<\/p>\n<ul>\n<li>QuaDream made use of the same flaw to commit similar attacks against iPhones.<\/li>\n<li>The company is smaller than NSO Group, but also sells smartphone hacking tools to governments.<\/li>\n<li>Both companies used the same <a href=\"https:\/\/citizenlab.ca\/2021\/08\/bahrain-hacks-activists-with-nso-group-zero-click-iphone-exploits\/\" rel=\"noopener nofollow\" target=\"_blank\">highly sophisticated<\/a>\u00a0&#8220;zero-click&#8221;\u00a0ForcedEntry attack, which enabled them to remotely break into iPhones without an owner needing to click a malicious link.<\/li>\n<li>Once deployed, attackers using the software could access messages, intercept calls, and use the device as a remote listening device. They also gained access to the camera and more.<\/li>\n<li>Apple closed this vulnerability in September 2021.<\/li>\n<li>It is <a href=\"https:\/\/www.amnesty.org\/en\/latest\/news\/2021\/07\/pegasus-project-apple-iphones-compromised-by-nso-spyware\/\" rel=\"noopener nofollow\" target=\"_blank\">believed<\/a> NSO Group software was used to target the family of murdered Saudi journalist Jamal Khashoggi.<\/li>\n<\/ul>\n<p>The news follows the revelation that the\u00a0<a href=\"https:\/\/www.theguardian.com\/news\/2022\/feb\/02\/fbi-confirms-it-obtained-nsos-pegasus-spyware\" rel=\"noopener nofollow\" target=\"_blank\">FBI also obtained NSO\u2019s Pegasus spyware<\/a>, but claims it did not use it. That \u00a0also follows another recent claim that NSO Group <a href=\"https:\/\/arstechnica.com\/tech-policy\/2022\/02\/report-nso-offered-us-firm-bags-of-cash-for-help-spying-on-cellphone-users\/\" rel=\"noopener nofollow\" target=\"_blank\">offered \u201cbags of cash\u201d<\/a> in exchange for access to US cellular networks via the <a href=\"https:\/\/people.cs.rutgers.edu\/~rmartin\/teaching\/fall04\/cs552\/readings\/ss7.pdf\" rel=\"noopener nofollow\" target=\"_blank\">SS7 network<\/a>.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3649208\/second-israeli-firm-accused-of-undermining-iphones-like-nso-group.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[2211,8826,10554,714,24580],"class_list":["post-18187","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-apple","tag-iphone","tag-mobile","tag-security","tag-small-and-medium-business"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18187","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18187"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18187\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18187"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18187"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18187"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}