TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

NSO Group's iPhone Zero-Days used against a UAE Human Rights Defender

1055 pointsby dropalltablesover 8 years ago

33 comments

linkregisterover 8 years ago
Amazing work by Lookout and Citizen Lab.<p>Until this point I was not aware that Lookout provided any value-add for mobile devices. I was under the impression it was the McAfee of mobile.<p>It sounds mean but this is the first reference to actual vulnerability discovery done by themselves on their blog, which usually reports on security updates that Google&#x27;s Android security team discovered. Previous entries include such gems as &quot;Now available: The Practical Guide to Enterprise Mobile Security&quot; and &quot;Insights from Gartner: When and How to Go Beyond EMM to Ensure Secure Enterprise Mobility.&quot;<p>I can&#x27;t wait to see more great work. Lookout is now on my radar.
评论 #12361214 未加载
评论 #12361069 未加载
评论 #12361251 未加载
评论 #12362666 未加载
评论 #12362644 未加载
toufkaover 8 years ago
There is a frustration, as a user, that as the value of the iOS exploits increase, they become more and more &#x27;underground&#x27;. The time between OS release and public jailbreak is continually growing - and it doesn&#x27;t seem to only be due to the hardening of the OS. People are selling their exploits rather than releasing them publicly. And the further underground they go, the more likely they will be utilized for nefarious purposes rather than allowing me to edit my own HOSTS file. The most recent iOS jailbreak (to be able to gain root access to <i>my</i> iPhone) lasted less than a month before Apple stopped signing the old OS. Yet its clear this (new) quick action on Apple&#x27;s part does not (yet?) stop persistent state-sponsored adversaries.<p>It is more and more clear that to accept Apple&#x27;s security (which seems to be getting better, but obviously still insufficient) I must also accept Apple&#x27;s commercial limitations to the use of a device I own. And I suppose that the dividing line between the ability to exploit a vulnerability and to &#x27;have control&#x27; is a sliding scale for every user: one man&#x27;s &#x27;obvious&#x27; kernel exploit is another man&#x27;s &#x27;obvious&#x27; phishing scam.<p>It is not a new tension, but it does seem the stakes on both sides seem to be getting higher and higher - total submission to an onerous EULA vs total exploitable knowledge about me and my device. Both sides seem to have forced each other to introduce the concept of &#x27;total&#x27; to those stakes, and that is frustrating. More-so when it&#x27;s not yet clear which threat is greater.
评论 #12363552 未加载
评论 #12362878 未加载
评论 #12362957 未加载
评论 #12361340 未加载
评论 #12363492 未加载
评论 #12363276 未加载
gueloover 8 years ago
NSO sells tools that when used violate the CFAA act. It is an Israeli company but a majority share was bought by a San Francisco based VC [0]. It doesn&#x27;t seem like it should be legally allowed to exist as an American owned company. Maybe Ahmed Mansoor could sue the VC in American courts.<p>[0] <a href="http:&#x2F;&#x2F;jewishbusinessnews.com&#x2F;2014&#x2F;03&#x2F;19&#x2F;francisco-partners-acuires-israeli-intelligence-cyber-tracking-developer-start-up-nso-for-120-million&#x2F;" rel="nofollow">http:&#x2F;&#x2F;jewishbusinessnews.com&#x2F;2014&#x2F;03&#x2F;19&#x2F;francisco-partners-...</a>
评论 #12362807 未加载
评论 #12361456 未加载
0x0over 8 years ago
An untethered stealth jailbreak that installs without user interaction from a webview, that&#x27;s almost as bad as it gets. And for iOS 7.0.0 - 9.3.4 inclusive. And with exfiltration of audio, video, whatsapp, viber, etc etc. So thorough and so bad :-&#x2F;
评论 #12361073 未加载
评论 #12360810 未加载
评论 #12361426 未加载
评论 #12361294 未加载
评论 #12362710 未加载
评论 #12360927 未加载
micaksicaover 8 years ago
The UAE really hates on activists, and appears to be hiring a bunch of people specifically to suppress activists&#x2F;dissidents within the country. [1] Unfortunately, due to the amount of wealth the country has, it won&#x27;t stop almost anybody from dealing with them unless Western sanctions are placed on the country, which are unlikely given the current geopolitical situation.<p><a href="https:&#x2F;&#x2F;www.evilsocket.net&#x2F;2016&#x2F;07&#x2F;27&#x2F;How-The-United-Arab-Emirates-Intelligence-Tried-to-Hire-me-to-Spy-on-its-People&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.evilsocket.net&#x2F;2016&#x2F;07&#x2F;27&#x2F;How-The-United-Arab-Em...</a>
评论 #12361085 未加载
评论 #12361454 未加载
评论 #12361210 未加载
评论 #12362338 未加载
hackuserover 8 years ago
Should exploits like this be treated as munitions, with sale to foreign governments restricted? Or any sale at all restricted? Some thoughts:<p>* The only uses for the exploits are either illegal or by government security organizations<p>* I don&#x27;t think you can just make an explosive and sell it to a foreign government; I think there are strict export controls (though I know very few details, I only read about companies applying, getting approval, etc.).<p>* In the 1990s, strong encryption was called a &#x27;munition&#x27; and export was restricted. That turned out to be impractical (it was available in many countries and the Internet has no borders), morally questionable (restricting private citizen&#x27;s privacy), and it fell apart.<p>While I believe in liberty and freedom-to-tinker, as I said, this stuff has no legitimate use.
评论 #12361491 未加载
评论 #12361386 未加载
评论 #12361552 未加载
评论 #12361409 未加载
评论 #12361578 未加载
bkmintieover 8 years ago
Vice has a nice writeup on the exploits as well: <a href="https:&#x2F;&#x2F;motherboard.vice.com&#x2F;read&#x2F;government-hackers-iphone-hacking-jailbreak-nso-group" rel="nofollow">https:&#x2F;&#x2F;motherboard.vice.com&#x2F;read&#x2F;government-hackers-iphone-...</a>
评论 #12360862 未加载
Miner49erover 8 years ago
This vulnerability sounds like this:<p><a href="https:&#x2F;&#x2F;www.zerodium.com&#x2F;ios9.html" rel="nofollow">https:&#x2F;&#x2F;www.zerodium.com&#x2F;ios9.html</a><p>It was claimed November of last year. I wouldn&#x27;t be surprised if this &quot;Trident&quot; was sold by Zerodium. Glad it&#x27;s patched.<p>Edit:<p>I just saw the Citizen Lab article on this:<p><a href="https:&#x2F;&#x2F;citizenlab.org&#x2F;2016&#x2F;08&#x2F;million-dollar-dissident-iphone-zero-day-nso-group-uae&#x2F;" rel="nofollow">https:&#x2F;&#x2F;citizenlab.org&#x2F;2016&#x2F;08&#x2F;million-dollar-dissident-ipho...</a><p>They mention the Zerodium bounty as well.
评论 #12360895 未加载
epistasisover 8 years ago
Not having heard about NSO Group before, they&#x27;ve been claiming to have this ability since 2014:<p><a href="http:&#x2F;&#x2F;blogs.wsj.com&#x2F;digits&#x2F;2014&#x2F;08&#x2F;01&#x2F;can-this-israeli-startup-hack-your-phone&#x2F;" rel="nofollow">http:&#x2F;&#x2F;blogs.wsj.com&#x2F;digits&#x2F;2014&#x2F;08&#x2F;01&#x2F;can-this-israeli-star...</a><p>What other 0-days do they have in their pockets?
jtchangover 8 years ago
The article mentions how this may have been use all the way back in iOS 7 which is crazy.<p>If you are being targeted for surveillance smartphones are a very bad idea depending on your adversary. A cheap phone that is refreshed regularly will probably be your best bet.
评论 #12361053 未加载
评论 #12361235 未加载
评论 #12360991 未加载
gerglesover 8 years ago
Here are the full technical details: <a href="https:&#x2F;&#x2F;info.lookout.com&#x2F;rs&#x2F;051-ESQ-475&#x2F;images&#x2F;lookout-pegasus-technical-analysis.pdf" rel="nofollow">https:&#x2F;&#x2F;info.lookout.com&#x2F;rs&#x2F;051-ESQ-475&#x2F;images&#x2F;lookout-pegas...</a>
dropalltablesover 8 years ago
Make sure to update to 9.3.5 on all of your iOS devices ASAP!
评论 #12361255 未加载
评论 #12361209 未加载
timealover 8 years ago
You can be sure that this vulnerability was probably discovered by some researcher, then sold to grey markets like <a href="https:&#x2F;&#x2F;www.zerodium.com" rel="nofollow">https:&#x2F;&#x2F;www.zerodium.com</a> or <a href="https:&#x2F;&#x2F;www.exodusintel.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.exodusintel.com&#x2F;</a> (they pay up to $1 million for a highprofile iOS exploit), who then resold it to some government who is now trying to exploit this dude&#x27;s phone...
driverdanover 8 years ago
To people who work for companies that sell &#x2F; invest in products that are used in unethical ways (Francisco Partners, NSO, Cisco, etc), how do you justify it to yourself?
评论 #12364581 未加载
scosmanover 8 years ago
Does anyone know if the iOS 10 developer beta 7 (public beta 6) got this patch, or are we vulnerable?
评论 #12362300 未加载
评论 #12361039 未加载
评论 #12362305 未加载
firloopover 8 years ago
Apple made its bug bounty program public a few weeks ago and the past few iOS updates have all been patching security vulns. It could be a coincidence, but from an outsider&#x27;s point of view, it looks like the program is working.
评论 #12361684 未加载
artursapekover 8 years ago
Will 9.3.5 disable&#x2F;remove the spyware on infected phones? Or does it just prevent one from becoming infected?
评论 #12361319 未加载
评论 #12361321 未加载
walrus01over 8 years ago
This is a REALLY, REALLY good reason why &quot;activists&quot; of any variety should be trained in how to acquire an old Thinkpad and install Debian on it (plus a reasonably xorg&#x2F;XFCE4 desktop environment). If you&#x27;re dealing with authoritarian regimes you can do a lot to reduce your attack surface. However at the end it all comes down to rubber hose cryptography. If your government, for example Bahrain decides to detain and torture you, you&#x27;re pretty much fucked.
评论 #12362173 未加载
评论 #12361694 未加载
SanPilotover 8 years ago
I&#x27;m a beginner when it comes to software development (mostly web development), but it seems to me that the majority of complex exploits like this involve some type of memory overflow and subsequent code execution.<p>Shouldn&#x27;t there be methods for detecting these kinds of things in source code or more priority given to preventing it in the C&#x2F;low-level community?
评论 #12363519 未加载
Osmiumover 8 years ago
Aside, but does anybody else find the switch from right-to-left to left-to-right really jarring in this screenshot?<p><a href="https:&#x2F;&#x2F;citizenlab.org&#x2F;wp-content&#x2F;uploads&#x2F;2016&#x2F;08&#x2F;image13-768x706.jpg" rel="nofollow">https:&#x2F;&#x2F;citizenlab.org&#x2F;wp-content&#x2F;uploads&#x2F;2016&#x2F;08&#x2F;image13-76...</a><p>It has the effect of introducing a line-break into the middle of a line, rather than at either end. I&#x27;ve never encountered this before and it took my brain a few seconds to catch on.<p>I&#x27;d be really curious how native bilingual readers of both a right-to-left and left-to-right language would read that. Does it look natural? Where do your eyes go first?
评论 #12363441 未加载
e28etaover 8 years ago
I thought it was interesting that they&#x27;re using Cydia Substrate to hook into specific third-party apps for monitoring.<p>I wonder if we&#x27;ll ever see privacy conscious apps using some sort of obfuscation. So that every time you update your app, the attacker will have to reverse-engineer the symbol names again.<p>It seems like a compile or link time tool could find method call &amp; selector references. As long as your app isn&#x27;t calling methods using strings, or doing something else tricky, I think it could work.<p>Or you could just write the app in swift. It&#x27;s the Objective-C runtime that makes it so easy to intercept method calls.
评论 #12362367 未加载
评论 #12362164 未加载
评论 #12362064 未加载
eggyover 8 years ago
Unless you are a high-value target, Apple&#x27;s security seems fairly sufficient for normal use (I have Android ;)). Companies like NSO Group that state that they play both sides without any moral compass seem like a great target for Anonymous or others. Imagine the client list, and banking information as a trail to blaze!
评论 #12364626 未加载
Jerry2over 8 years ago
How does one monitor the infection of an iOS device and how do you capture and store all the stages of an infection?<p>I&#x27;ve never done any reverse engineering so I&#x27;m not sure how you&#x27;d go about recording what an infection like this does to your device...
matt_wulfeckover 8 years ago
He wasn&#x27;t hacked, he was being &quot;lawfully intercepted&quot;!<p>Just kidding. The difference here is that a government doesn&#x27;t want to do such as provide reasonable suspicion or go publicly in front of a judge.
maglavaitssover 8 years ago
So, basically three things to notice:<p>1. never click on links in e-mails. 2. if you&#x27;re targeted by a nation state, you&#x27;re screwed. 3. everybody is vulnerable to rubber-hose cryptography.
Tepixover 8 years ago
It&#x27;s curious that Signal was missing in their list of apps that can be intercepted. Are the targets not using it? Or was it just not mentioned?
metafunctorover 8 years ago
Is there any way to check if an iOS device has Pegasus installed, without installing and registering for the Lookout app?
评论 #12361660 未加载
评论 #12363538 未加载
abecedariusover 8 years ago
I have an iPad 1 which long ago was left behind by upgrades. It&#x27;d be nice to know when the vulnerabilities were <i>introduced</i> too. Should I stop doing anything networked with it?
评论 #12362406 未加载
dborehamover 8 years ago
&quot;we did not have an iPhone 6 available for testing&quot;<p>Big budget operation!
评论 #12363597 未加载
chensterover 8 years ago
I think NSA is trying to acquire them.
okketover 8 years ago
<a href="https:&#x2F;&#x2F;citizenlab.org&#x2F;2016&#x2F;08&#x2F;million-dollar-dissident-iphone-zero-day-nso-group-uae&#x2F;" rel="nofollow">https:&#x2F;&#x2F;citizenlab.org&#x2F;2016&#x2F;08&#x2F;million-dollar-dissident-ipho...</a><p><pre><code> &gt; Alarmingly, some of the names suggested a willingness on &gt; the part of the operators to impersonate governments and &gt; international organizations. For example, we found two &gt; domain names that appear intended to masquerade as an &gt; official site of the International Committee of the Red &gt; Cross (ICRC): icrcworld.com and redcrossworld.com.</code></pre>
评论 #12360974 未加载
评论 #12362140 未加载
评论 #12362425 未加载
评论 #12362182 未加载
评论 #12362630 未加载
landr0idover 8 years ago
This is off-topic but at first I thought I was on a Spotify blog page. Lookout has <i>very</i> similar branding.
评论 #12362127 未加载
themihaiover 8 years ago
&lt;&lt; Instead of clicking, Mansoor sent the messages to Citizen Lab researchers.<p>The story is great but I really doubt this. I&#x27;m wondering what made him suspect the link? Does he send all the links he receives to Citizen Lab?
评论 #12363039 未加载
评论 #12362732 未加载