AP

Two-year operation indiscriminately infects iPhones with spyware

Aug 30, 2019, 6:27 PM | Updated: 6:49 pm

AP Photo/Marcio Jose Sanchez, File...

AP Photo/Marcio Jose Sanchez, File

(AP) — Researchers say suspected nation-state hackers infected Apple iPhones with spyware for over two years. On Friday, security experts called the hacking an alarming security failure for a company whose calling card is privacy.

Just visiting one of a small number of tainted websites could infect an iPhone. The implant was capable of sending information from the smartphone to the cybercriminals behind the operation. The personal information included text messages, email, photos, and real-time location data.

“This is definitely the most serious iPhone hacking incident that’s ever been brought to public attention, both because of the indiscriminate targeting and the amount of data compromised by the implant,” said former U.S. government hacker Jake Williams, the president of Rendition Security.

Apple quietly patched the problem

Announced late Thursday by Google researchers, the last of the vulnerabilities were quietly fixed by Apple by February but only after thousands of iPhone users were believed exposed over more than two years.

The researchers did not identify the websites used to seed the spyware or their location. They also did not say who was behind the cyber espionage or what population was targeted, but experts said the operation had the hallmarks of a nation-state effort.

Williams said the spyware implant wasn’t written to transmit stolen data securely, indicating the hackers were not concerned about getting caught. That suggests an authoritarian state was behind it. He speculated that it was likely used to target political dissidents.

Affected apps include text messages, Gmail

Sensitive data accessed by the spyware included WhatsApp, iMessage and Telegram text messages, Gmail, photos, contacts and real-time location — essentially all the databases on the victim’s phone. While the messaging applications may encrypt data in transit, it is readable at rest on iPhones.

Google researcher Ian Beer said in a blog posted late Thursday that the discovery should dispel any notion that it costs a million dollars to successfully hack an iPhone. That’s a reference to the case of a United Arab Emirates dissident whose iPhone was infected in 2016 with so-called zero-day exploits, which have been known to fetch such high prices.

“Zero day” refers to the fact that such exploits are unknown to the developers of the affected software, and thus they have had no time to develop patches to fix it.
The discovery, involving 14 such vulnerabilities, was made by Google researchers at Project Zero, which hunts the security flaws in software and microprocessor firmware, independent of their manufacturer, that criminals, state-sponsored hackers and intelligence agencies use.

“This should serve as a wake-up call to folks,” said Will Strafach, a mobile security expert with Sudo Security. “Anyone on any platform could potentially get infected with malware.”

Popular, busy apps targeted

Beer said his team estimated that the infected websites used in the “indiscriminate watering hole attacks” receive thousands of visitors per week. He said the team collected five separate chains of exploits covering Apple’s iOS system as far back as version 10, released in 2016.

Apple did not respond to requests for comment on why it did not detect the vulnerabilities on its own and if it can assure users that such a general attack could not happen again. Privacy assurance is central to the Apple brand.

Neither Google nor Beer responded to questions about the attackers or the targets, though Beer provided a hint in his blog post: “To be targeted might mean simply being born in a certain geographic region or being part of a certain ethnic group.”

Game-changing attack

Security manager Matt Lourens at Check Point Software Technologies called the development an alarming game-changer. He said that while iPhone owners previously compromised by zero days were high-value targets, a more widespread seeding of spyware at a lower cost per infection has now been shown possible.

“This should absolutely reshape the way corporations view the use of mobile devices for corporate applications, and the security risk it introduces to the individual and/or organization,” Lourens said in an email.

In his blog post, the Google researcher Beer warned that absolute digital security can’t be guaranteed.

Smartphone users must ultimately “be conscious of the fact that mass exploitation still exists and behave accordingly;” he wrote, “treating their mobile devices as both integral to their modern lives, yet also as devices which when compromised, can upload their every action into a database to potentially be used against them.”

___
AP Cybersecurity Writer Frank Bajak on Twitter: https://twitter.com/fbajak

 

We want to hear from you.

Have a story idea or tip? Send it to the KSL NewsRadio team here.

AP

Southern California tailback Reggie Bush picks up the Heisman Trophy after being announced as the w...

GREG BEACHAM AP Sports Writer

Reggie Bush is reinstated as 2005 Heisman Trophy winner, with organizers citing NIL rule changes

Reggie Bush has his Heisman back. The Heisman Trust reinstated the former Southern California tailback as the 2005 Heisman Trophy winner.

2 days ago

The seal of the Federal Communications Commission (FCC) is seen before an FCC meeting to vote on ne...

DAVID HAMILTON AP Technology Writer

Net neutrality restored as FCC votes to regulate internet providers

SAN FRANCISCO (AP) — The Federal Trade Commission on Thursday voted to restore “net neutrality” rules that prevent broadband internet providers such as Comcast and Verizon from favoring some sites and apps over others. The move effectively reinstates a net neutrality order the commission first issued in 2015 during the Obama administration. In 2017, under […]

2 days ago

Passenger drop off their baggage at United Airlines in C Terminal at George Bush Intercontinental A...

DAVID KOENIG AP Airlines Writer

Airlines will now be required to give automatic cash refunds for canceled and delayed flights

The Biden administration issued final rules to require airlines to automatically issue cash refunds for things like delayed flights.

2 days ago

FILE - Chicago's iconic Rat Hole along the 1900 block of West Roscoe Street in the Roscoe Village n...

RICK CALLAHAN and KATHLEEN FOODY Associated Press

Chicago’s ‘rat hole’ removed after city determines sidewalk with animal impression was damaged

A Chicago sidewalk landmark called the "rat hole" was removed Wednesday after city officials said it was damaged and needed to be replaced.

3 days ago

Two horses on the loose bolt through the streets of London near Aldwych, on Wednesday April 24, 202...

Pan Pylas, Associated Press

Rush hour chaos in London as 5 military horses run amok after getting spooked during exercise

The chaos started when the horses were exercising for an upcoming military parade and heard a construction noise from a nearby building.

3 days ago

A TikTok content creator, sits outside the U.S. Capitol, Tuesday, April 23, 2024....

HALELUYA HADERO AP Business Writer

Senate passes bill forcing TikTok parent company to sell or face ban, sends to Biden for signature

The Senate passed legislation that would force the parent company of TikTok to sell the social media platform under the threat of a ban.

4 days ago

Sponsored Articles

a doctor putting her hand on the chest of her patient...

Intermountain Health

Intermountain nurse-midwives launch new gynecology access clinic

An access clinic launched by Intermountain nurse-midwives provides women with comprehensive gynecology care.

Young couple hugging while a realtor in a suit hands them keys in a new home...

Utah Association of Realtors

Buying a home this spring? Avoid these 5 costly pitfalls

By avoiding these pitfalls when buying a home this spring, you can ensure your investment will be long-lasting and secure.

a person dressed up as a nordic viking in a dragon boat resembling the bear lake monster...

Bear Lake Convention and Visitors Bureau

The Legend of the Bear Lake Monster

The Bear Lake monster has captivated people in the region for centuries, with tales that range from the believable to the bizarre.

...

Live Nation Concerts

All the artists coming to Utah First Credit Union Amphitheatre (formerly USANA Amp) this summer

Summer concerts are more than just entertainment; they’re a celebration of life, love, and connection.

Mother and cute toddler child in a little fancy wooden cottage, reading a book, drinking tea and en...

Visit Bear Lake

How to find the best winter lodging in Bear Lake, Utah

Winter lodging in Bear Lake can be more limited than in the summer, but with some careful planning you can easily book your next winter trip.

Happy family in winter clothing at the ski resort, winter time, watching at mountains in front of t...

Visit Bear Lake

Ski more for less: Affordable ski resorts near Bear Lake, Utah

Plan your perfect ski getaway in Bear Lake this winter, with pristine slopes, affordable tickets, and breathtaking scenery.

Two-year operation indiscriminately infects iPhones with spyware