TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Operation Triangulation: What you get when attack iPhones of researchers

549 pointsby ruikover 1 year ago

48 comments

sweisover 1 year ago
The video of the talk is online now too: <a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=7VWNUUldBEE" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=7VWNUUldBEE</a>
mike_hearnover 1 year ago
That&#x27;s pretty astonishing. The MMIO abuse implies either the attackers have truly phenomenal research capabilities, and&#x2F;or that they hacked Apple and obtained internal hardware documentation (more likely).<p>I was willing to believe that maybe it was just a massive NSA-scale research team up until the part with a custom hash function sbox. Apple appears to have known that the feature in question was dangerous and deliberately both hidden it, whatever it is, and then gone further and protected it with a sort of (fairly weak) digital signing feature.<p>As the blog post points out, there&#x27;s no obvious way you could find the right magic knock to operate this feature short of doing a full silicon teardown and reverse engineering (impractical at these nodes). That leaves hacking the developers to steal their internal documentation.<p>The way it uses a long chain of high effort zero days only to launch an invisible Safari that then starts from scratch, loading a web page that uses a completely different chain of exploits to re-hack the device, also is indicative of a massive organization with truly abysmal levels of internal siloing.<p>Given that the researchers in question are Russians at Kaspersky, this pretty much has to be the work of the NSA or maybe GCHQ.<p><i>Edit: misc other interesting bits from the talk: the malware can enable ad tracking, and also can detect cloud iPhone service hosting that&#x27;s often used by security researchers. The iOS&#x2F;macOS malware platform seems to have been in development for over a decade and actually does ML on the device to do object recognition and OCR on photos on-device, to avoid uploading image bytes: they only upload ML generated labels. They truly went to a lot of effort, but all that was no match for a bunch of smart Russian students.<p>I&#x27;m not sure I agree with the speaker that security through obscurity doesn&#x27;t work, however. This platform has been in the wild for ten years and nobody knows how long they&#x27;ve been exploiting this hidden hardware &quot;feature&quot;. If the hardware feature was openly documented it&#x27;d have been found much, much sooner.</i>
评论 #38787590 未加载
评论 #38787187 未加载
评论 #38789922 未加载
评论 #38785081 未加载
评论 #38790345 未加载
评论 #38790920 未加载
评论 #38788381 未加载
评论 #38808479 未加载
评论 #38803198 未加载
评论 #38787599 未加载
评论 #38790333 未加载
评论 #38787713 未加载
DantesKiteover 1 year ago
Steve Weis on Twitter described it best:<p>“This iMessage exploit is crazy. TrueType vulnerability that has existed since the 90s, 2 kernel exploits, a browser exploit, and an undocumented hardware feature that was not used in shipped software”<p><a href="https:&#x2F;&#x2F;x.com&#x2F;sweis&#x2F;status&#x2F;1740092722487361809?s=46&amp;t=E3U2EI7EXIhlBQmxg6oZ2g" rel="nofollow">https:&#x2F;&#x2F;x.com&#x2F;sweis&#x2F;status&#x2F;1740092722487361809?s=46&amp;t=E3U2EI...</a>
Mueheover 1 year ago
For those interested in the talk by the Kaspersky researches, the cleaned video isn&#x27;t uploaded yet but you can find a stream replay here:<p><a href="https:&#x2F;&#x2F;streaming.media.ccc.de&#x2F;37c3&#x2F;relive&#x2F;a91c6e01-49cf-4227-baae-aece190e9de5" rel="nofollow">https:&#x2F;&#x2F;streaming.media.ccc.de&#x2F;37c3&#x2F;relive&#x2F;a91c6e01-49cf-422...</a><p>(talk starts at minute 26:20)
评论 #38790728 未加载
cf1241290841over 1 year ago
As its about a 37c3 presentation here a comment from Fefe¹ in German <a href="https:&#x2F;&#x2F;blog.fefe.de&#x2F;?ts=9b729398" rel="nofollow">https:&#x2F;&#x2F;blog.fefe.de&#x2F;?ts=9b729398</a><p>According to him the exploit chain was likely worth in the region of a 8-digit dollar value.<p>¹ <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Felix_von_Leitner" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Felix_von_Leitner</a><p>I guess somebody is going to get fired.
评论 #38790499 未加载
londons_exploreover 1 year ago
Coresight is not some backdoor - it&#x27;s a debug feature of all ARM CPU&#x27;s. This looks like a necessary extension to coresight to work with Apples memory protection stuff.<p>Even though no public documentation exists, I&#x27;m sure thousands of Apple engineers have access to a modded gdb or other tooling to make use of it.
评论 #38788830 未加载
评论 #38788724 未加载
transputeover 1 year ago
iMessage can be disabled by local MDM for supervised devices, via free Apple Configurator in macOS app store, <a href="https:&#x2F;&#x2F;support.apple.com&#x2F;guide&#x2F;deployment&#x2F;restrictions-for-iphone-and-ipad-dep0f7dd3d8&#x2F;web" rel="nofollow">https:&#x2F;&#x2F;support.apple.com&#x2F;guide&#x2F;deployment&#x2F;restrictions-for-...</a><p><pre><code> For Wi-Fi–only devices, the Messages app is hidden. For devices with Wi-Fi and cellular, the Messages app is still available, but only the SMS&#x2F;MMS service can be used. </code></pre> SMS&#x2F;MMS messages and non-emergency cellular radio traffic can be disabled by a SIM PIN, e.g. when using device for an extended period via WiFi.
评论 #38785556 未加载
londons_exploreover 1 year ago
Notice that the hash value for a data write of all zero&#x27;s is zero...<p>And for a single bit, the hash value is a single value from the sbox table. That means this hash algorithm could reasonably have been reverse engineered without internal documentation.
评论 #38787304 未加载
londons_exploreover 1 year ago
What are the chances this MMIO register could have been discovered by brute force probing every register address?<p>Mere differences in timing could have indicated the address was a valid address, and then the hash could perhaps have been brute forced too since it is effectively a 20 bit hash.
评论 #38788974 未加载
评论 #38786851 未加载
soupdiverover 1 year ago
<a href="https:&#x2F;&#x2F;streaming.media.ccc.de&#x2F;37c3&#x2F;relive&#x2F;11859" rel="nofollow">https:&#x2F;&#x2F;streaming.media.ccc.de&#x2F;37c3&#x2F;relive&#x2F;11859</a>
评论 #38785122 未加载
评论 #38786747 未加载
WalterBrightover 1 year ago
The extra hardware registers might have been discovered by examining the chip itself. One could find where the registers were on it, and notice some extra registers, then do some experimenting to see what they did.
评论 #38784880 未加载
评论 #38787424 未加载
评论 #38785812 未加载
评论 #38784707 未加载
评论 #38786146 未加载
throwaway81523over 1 year ago
Philip Zimmermann a while back was working on a secure phone product called the Black Phone. I tried to convince him that a secure phone should not contain any microphones of any kind. That sounds a bit weird for a phone, but it&#x27;s ok, if you want to make a voice call, just plug a headset into it for the duration of the call. He wasn&#x27;t convinced, but this iphone exploit makes me believe it more than ever.
评论 #38790078 未加载
评论 #38799118 未加载
stefan_over 1 year ago
Maybe I&#x27;m too dumb to find it on this page but if you are looking for the actual recording instead of a calendar entry in the past, it&#x27;s here (a stream dump for now, fast forward to 27 mins):<p><a href="https:&#x2F;&#x2F;streaming.media.ccc.de&#x2F;37c3&#x2F;relive&#x2F;11859" rel="nofollow">https:&#x2F;&#x2F;streaming.media.ccc.de&#x2F;37c3&#x2F;relive&#x2F;11859</a>
trustingtrustover 1 year ago
&gt;Hardware security very often relies on “security through obscurity”, and it is much more difficult to reverse-engineer than software, but this is a flawed approach, because sooner or later, all secrets are revealed.<p>The later works when you are not as big as Apple. When you are as big as Apple, you are a very hot target for attackers. There is always the effort vs reward when it comes to exploiting vulnerabilities. The amount of effort that goes into all this is worth thousands of dollars even if someone is doing it just for research. If I was doing this for some random aliexpress board it would be worth nothing and probably security by obscurity would mean no one really cares and the later part works here. But I wonder what Apple is thinking when they use obscurity cause people must start working on exploiting new hardware from day 1. You literally can get one on every corner in a city these days. Hardware Security by obscurity for example would be fine for cards sold by someone like nvidia to only some cloud customers and those are then assumed obsolete in a few years so even if someone gets those on eBay the reward is very low. iPhones on the other hand are a very consumer device and people hang on to their devices for very long.
I_Am_Nousover 1 year ago
&gt;Although infections didn’t survive a reboot<p>Reminder to reboot your iPhone at least weekly if you are concerned about this kind of attack.
评论 #38787904 未加载
评论 #38787150 未加载
评论 #38789475 未加载
kevinwangover 1 year ago
Wow, that&#x27;s amazing. I wonder if attacker like this feel unappreciated since they can&#x27;t take credit for their work.
评论 #38787151 未加载
codedokodeover 1 year ago
I see that one of the steps in exploit was to use GPU registers to bypass kernel memory protection. Does it mean that the vulnerability cannot be fixed by an update and existing devices will stay vulnerable?
评论 #38788463 未加载
评论 #38788259 未加载
评论 #38788358 未加载
kristofferRover 1 year ago
Why would the attackers target Kasperspy employees? Seems like a great way to get your exploit chain exposed
评论 #38799640 未加载
luke-stanleyover 1 year ago
I didn&#x27;t hear anyone mention fuzzing once. I guess there was probably very specific insider knowledge being made use of and they wanted to point a finger, which is fair enough I guess. I&#x27;m just a bit surprised that it has not been mentioned so far in the discussion. Anyhow it seems that a allow-list approach by Apple would have been better than a deny list approach! Literally not checking out of expected bounds!
评论 #38787504 未加载
评论 #38787521 未加载
neilvover 1 year ago
&gt; <i>If we try to describe this feature and how the attackers took advantage of it, it all comes down to this: they are able to write data to a certain physical address while bypassing the hardware-based memory protection by writing the data, destination address, and data hash to unknown hardware registers of the chip unused by the firmware.</i><p>Did the systems software developers know about these registers?
amaiover 1 year ago
See also the article from Ars Technica in June 2023: <a href="https:&#x2F;&#x2F;arstechnica.com&#x2F;information-technology&#x2F;2023&#x2F;06&#x2F;clickless-ios-exploits-infect-kaspersky-iphones-with-never-before-seen-malware&#x2F;" rel="nofollow">https:&#x2F;&#x2F;arstechnica.com&#x2F;information-technology&#x2F;2023&#x2F;06&#x2F;click...</a>
Despegarover 1 year ago
I&#x27;m curious to know from experts if there&#x27;s anything Apple can do to create a step-change in terms of security of iPhones? Like if the going rate for a zero day is $1 million, is there anything Apple can do that can drive that up to $2 or $3 million? Or is it just going to be a perpetual cat and mouse game with no real &quot;progress&quot;?
评论 #38786111 未加载
评论 #38786525 未加载
评论 #38787555 未加载
评论 #38787844 未加载
评论 #38794446 未加载
评论 #38785993 未加载
评论 #38789011 未加载
mb4nckover 1 year ago
At least the first version of the recording is now up: <a href="https:&#x2F;&#x2F;media.ccc.de&#x2F;v&#x2F;37c3-11859-operation_triangulation_what_you_get_when_attack_iphones_of_researchers" rel="nofollow">https:&#x2F;&#x2F;media.ccc.de&#x2F;v&#x2F;37c3-11859-operation_triangulation_wh...</a>
patrickhogan1over 1 year ago
Knowing more about the exfiltration component where it sends data to a remote server would be helpful. According to the article it’s sending large audio microphone recordings. I assume a company like Kapersky would explicit deny all outgoing network connections and then approve one by one.
评论 #38785723 未加载
评论 #38788304 未加载
jeffreygoestoover 1 year ago
Some agencies will be very sad now...
评论 #38787528 未加载
xvectorover 1 year ago
Does Lockdown Mode prevent agains this?
评论 #38785905 未加载
评论 #38786033 未加载
g-b-rover 1 year ago
Are hashes of the data ever used in known chip debugging features?<p>Since they&#x27;re supposed to be disabled in production, what would be their point?<p>I&#x27;m no electronic engineer, but isn&#x27;t it best for them to be fast and simple, to reduce the chance that they cause interference themselves..?<p>And isn&#x27;t it strongly unlikely that an attacker in the supply chain (TSMC??) would be able to reliably plant this in all Apple chips from the A12 to the A16 and the M1 ??
anotherhueover 1 year ago
More important than getting their newly found exploits, you get to know which of yours might be compromised. Prevents counterintelligence.
Lucover 1 year ago
This made me laugh: &quot;Upon execution, it decrypts (using a custom algorithm derived from GTA IV hashing) its configuration [...]&quot;<p>From <a href="https:&#x2F;&#x2F;securelist.com&#x2F;triangulation-validators-modules&#x2F;110847&#x2F;" rel="nofollow">https:&#x2F;&#x2F;securelist.com&#x2F;triangulation-validators-modules&#x2F;1108...</a>
MagicMoonlightover 1 year ago
That’s going to be a Chinese tool. Knowing the hardware that intimately and having all these convenient undocumented areas to play with is exactly the kind of thing you can put in place if you control the manufacturing.
dangover 1 year ago
Related:<p><i>4-year campaign backdoored iPhones using advanced exploit</i> - <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=38784073">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=38784073</a><p>(We moved the comments hither, but the article might still be of interest)
apienxover 1 year ago
Reminder that Lockdown Mode helps reduce the attack surface of your iPhone. It also helps tremendously with detection. <a href="https:&#x2F;&#x2F;support.apple.com&#x2F;en-us&#x2F;105120" rel="nofollow">https:&#x2F;&#x2F;support.apple.com&#x2F;en-us&#x2F;105120</a>
评论 #38787898 未加载
LanzVonLover 1 year ago
Isn&#x27;t the most obvious answer that Apple, like other US tech firms such as Google, simply creates these wild backdoors for the NSA&#x2F;GCHQ directly? Every time one&#x27;s patched, three more pop up. We already know Apple and Google cooperate with the spy agencies very eagerly.
评论 #38787716 未加载
评论 #38786776 未加载
Liebnitzover 1 year ago
&gt;Apple declined to comment for this article.
Liebnitzover 1 year ago
....
guwopover 1 year ago
Crazy!
cf1241290841over 1 year ago
Years ago i argued about the danger of pdfs with another account and was told not to be a paranoid nutjob.<p>Told you so.<p>edit: The fact that this obvious statement gets upvoted above the apple backdoor on 22:40 of the talk also says alot.<p>edit1: <a href="https:&#x2F;&#x2F;imgur.com&#x2F;a&#x2F;82JV7I9" rel="nofollow">https:&#x2F;&#x2F;imgur.com&#x2F;a&#x2F;82JV7I9</a>
hcarregaover 1 year ago
Theres a talk on ccc today
cedwsover 1 year ago
&gt;This attachment exploits vulnerability CVE-2023-41990 in the undocumented, Apple-only TrueType font instruction ADJUST for a remote code execution. This instruction existed since the early 90’s and the patch removed it.<p>This is getting ridiculous. How many iMessage exploits have there now been via attachments? Why aren&#x27;t Apple locking down the available codecs? Why isn&#x27;t BlastDoor doing its job?<p>This is really disappointing to see time and time again. If a simple app to send and receive messages is this hard to get right, I have very little hope left for software.
评论 #38788185 未加载
评论 #38786540 未加载
评论 #38787527 未加载
评论 #38788391 未加载
评论 #38787708 未加载
pushcxover 1 year ago
It’s quite unfortunate that Apple doesn’t allow users to uninstall iMessage, it seems to be the infection vector for advanced threats like this, NSO group, etc. Presumably it’s to avoid the support burden, but they could gate it behind having Lockdown Mode enabled for a week or something to shake out the vast majority of mistaken activations.
评论 #38785366 未加载
评论 #38784501 未加载
评论 #38784671 未加载
评论 #38785741 未加载
评论 #38784514 未加载
评论 #38785150 未加载
评论 #38786634 未加载
评论 #38784442 未加载
kornholeover 1 year ago
Who had motive to target Russian government officials, knowledge of the attack vectors, history of doing so, and technical and logistical ability to perform it leads Kaspersky and myself to the only rational conclusion: that Apple cooperated with the NSA on this exploit. I assume they only use and potentially burn these valuable methods in rare and perhaps desperate instances. I expect the Russian and Chinese governments&#x27; ban on use of Iphones will not be lifted and expand to other governments. Similarly to how the sanctions have backfired, this tactic will also backfire by reducing trust in Apple which is the core of their value proposition.
评论 #38785332 未加载
评论 #38784891 未加载
评论 #38785172 未加载
评论 #38785053 未加载
评论 #38784897 未加载
评论 #38784763 未加载
评论 #38784824 未加载
nothercastleover 1 year ago
State actor attacks on another state actor. Incredible sophisticated and just goes to show you that it basically can’t be defended against
评论 #38784677 未加载
评论 #38784710 未加载
评论 #38784829 未加载
haecceityover 1 year ago
This wouldn&#x27;t be zero click if iMessage didn&#x27;t parse attachments without user consent.
评论 #38788492 未加载
ThinkBeatover 1 year ago
Attack by CIA&#x2F;NSA?<p>They have the best possible insight into the hardware and software at all stages I should think.
评论 #38786816 未加载
评论 #38787738 未加载
jacooperover 1 year ago
This really looks like the NSA just flexing their muscles and their vulnerability arsenal.
评论 #38789253 未加载
评论 #38787743 未加载
codedokodeover 1 year ago
Now I am thinking Kaspersky should not have published this information. What a wrong decision. Instead they should have sold it to Russian government which I am sure could find lot of interesting uses for these &quot;debugging features&quot; and offer a good reward.
评论 #38822682 未加载
hnburnsyover 1 year ago
&gt;The resulting shellcode, in turn, went on to once again exploit CVE-2023-32434 and CVE-2023-38606 to finally achieve the root access required to install the last spyware payload.<p>Why isn&#x27;t Apple detecting the spyware\malware payload? If only Apps approved by Apple are allowed on an iPhone, detection should be trivial.<p>And why has no one bothered to ask Apple or ARM about this &#x27;unknown hardware&#x27;?<p>&gt;If we try to describe this feature and how the attackers took advantage of it, it all comes down to this: they are able to write data to a certain physical address while bypassing the hardware-based memory protection by writing the data, destination address, and data hash to unknown hardware registers of the chip unused by the firmware.<p>And finally does Lockdown mode mitigate any of this?
评论 #38785190 未加载
评论 #38785570 未加载
评论 #38785753 未加载
评论 #38788453 未加载
评论 #38784621 未加载
WhackyIdeasover 1 year ago
It’s kind of simple imo. Apple is an American company and after Jobs died, Apple quickly signed up to working with the NSA and enrolled in the Prism programme.<p>Apple, like any other USA company, has to abide by the laws and doing what they are told to do. If that means hardware backdoors, software backdoors, or giving NSA a heads up over a vulnerability during the time it takes to fix said vulnerability (to give time for NSA to make good use of it) then they will.<p>Only someone with great sway (like Jobs) could have resisted something like this without fear of the US Govt coming after him. His successor either didn’t have that passion for privacy or the courage to resist working with the NSA.<p>Anyone, anywhere with an iPhone will be vulnerable to NSA being able to break into their phone anytime they please, thanks to Apple. And with Apple now making their own silicon, the hardware itself will be even more of a backdoor.<p>Almost every single staff member at Apple will be none the wiser about this obv and unable to do anything about it even if they did - and their phones will be just as fair game to tap whenever the spies want.<p>I am speculating. But in my mind, it’s really quite obvious. Just like how Prism made me win an argument I had with someone who was a die hard Apple fan and thought they would protect privacy at all costs… 6 months later, Snowden came along and won me that argument.
评论 #38811986 未加载