Apple tackles iPhone
one-tap spyware flaws
Edited by Yosua Yonatan
Edited by Yosua Yonatan
Flaws
in Apple's iOS operating system have been discovered that made it possible to
install spyware on a target's device merely by getting them to click on a link.
The
discovery was made after a human rights lawyer alerted security researchers to
unsolicited text messages he had received.
They
discovered three previously unknown flaws within Apple's code.
Apple
has since released a software update that addresses the
problem.
The
two security firms involved, Citizen Lab and Lookout, said they had held back
details of the discovery until the fix had been issued.
Rare attack
The
lawyer, Ahmed Mansoor, received the text messages on 10 and 11 August.
The
texts promised to reveal "secrets" about people allegedly being
tortured in the United Arab Emirates (UAE)'s jails if he tapped the links.
Had
he done so, Citizen Lab says, his iPhone 6 would have been
"jailbroken", meaning unauthorised software could have been
installed.
"Once
infected, Mansoor's phone would have become a digital spy in his pocket,
capable of employing his iPhone's camera and microphone to snoop on activity in
the vicinity of the device, recording his WhatsApp and Viber calls, logging
messages sent in mobile chat apps, and tracking his movements," said
Citizen Lab.
"We
are not aware of any previous instance of an iPhone remote jailbreak used in
the wild as part of a targeted attack campaign, making this a rare find."
The
researchers say they believe the spyware involved was created by NSO Group, an
Israeli "cyber-war" company.
Image
copyright Citizenlab Image caption The spyware would have been installed if
Mansoor had tapped on the links
"[It
is] the most sophisticated spyware package we've seen," said Lookout.
"It
takes advantage of how integrated mobile devices are in our lives and the
combination of features only available on mobile - always connected (wi-fi,
3G/4G), voice communications, camera, email, messaging, GPS, passwords, and
contact lists."
Analysis: Dave Lee, BBC North America
technology reporter
This
is in many ways a textbook case of the cyber security community acting
precisely as it should. Researchers were alerted to a vulnerability,
investigated it, and made Apple, the company responsible for fixing it, aware
so it could issue a fix. Apple, to its credit, understood the severity and
acted quickly - it took them just 10 days.
These
types of vulnerabilities are rare and extremely lucrative. A genuine "zero
day" - the name given to previously unknown security flaws - can be sold
for upwards of $1m when it affects a major piece of software like Apple's iOS.
In this case, it looks like several zero days were combined to make a hugely
sophisticated attack package.
Now
attention is shifting to the secretive organisation said to be behind the
attack, the NSO Group, described by researchers as a cyber arms dealer, and
described by itself as firm capable of being a "ghost" on victims'
devices - working undetected but gathering enormous amounts of private data.
According
to Privacy International, NSO Group has sold its products to clients in Mexico
and in Panama - but little is known about other deals involving the company
which is said to be worth more than $1bn.
Pressure
is also being put on Francisco Partners Ltd, the San Francisco-based venture
capital firm that has a controlling stake in NSO Group. It is yet to comment on
the controversial attack.
NSO
has issued a statement acknowledging that it makes technology used to
"combat terror and crime" but said it had no knowledge of any
particular incidents and made no reference to the specific spyware involved.
"These
are rather rare zero-day flaws," commented security expert Prof Alan
Woodward, referring to the technical name for previously unknown
vulnerabilities.
"To
have several found at once is even rarer. As can be seen from how these have
been exploited to date, it represents a serious threat to the security and
privacy of iOS users.
"Apple
has been remarkably responsive in providing fixes for these issues, so I would
encourage any iOS users to update to the latest version of the operating
system."
For
its part, Apple has limited itself to saying: "We were made aware of this
vulnerability and immediately fixed it with iOS 9.3.5. We advise all of our
customers to always download the latest version of iOS to protect themselves
against potential security exploits."

Wow, such a great writing with brief analysis, and could you give me more ssuggestions on how to protect ourselves from that kind of spyware other than updating the iOs and not jail breaking our iPhone? Thank you!
ReplyDeleteThanks MIS_ITCorner. To protect our devices from spyware, from my opinion, there are 2 ways, using the system/software and prevent it manually.
ReplyDeleteFor using system/software, you can activate firewall on your computer and downloading real and official anti-spyware software, like SpyHunter that I use.
For manually prevent it, do not let other people to use your gadget, especially refuse them if they want to copy or give some data. The data might be fused with spyware.
That's all from me. Hope my reply answer your question