viralamo

Menu
  • Technology
  • Science
  • Money
  • Culturs
  • Trending
  • Video

Subscribe To Our Website To Receive The Last Stories

Join Us Now For Free
Home
Technology
Google warns that NSO hacking is on par with elite nation-state spies
Technology

Google warns that NSO hacking is on par with elite nation-state spies

18/12/2021

A man walks by the building entrance of Israeli cyber company NSO Group at one of its branches in the Arava Desert on November 11, 2021, in Sapir, Israel.
Enlarge / A man walks by the building entrance of Israeli cyber company NSO Group at one of its branches in the Arava Desert on November 11, 2021, in Sapir, Israel.

Amir Levy | Getty Images

The Israeli spyware developer NSO Group has shocked the global security community for years with aggressive and effective hacking toolsthat can target both Android and iOS devices. The company’s products have been so abused by its customers around the world that NSO Group now faces sanctions, high-profile lawsuits, and an uncertain future. But a new analysis of the spyware maker’s ForcedEntry iOS exploit—deployed in a number of targeted attacks against activists, dissidents, and journalists this year—comes with an even more fundamental warning: Private businesses can produce hacking tools that have the technical ingenuity and sophistication of the most elite government-backed development groups.

Google’s Project Zero bug-hunting group analyzed ForcedEntry using a sample provided by researchers at the University of Toronto’s Citizen Lab, which published extensively this year about targeted attacks utilizing the exploit. Researchers from Amnesty International also conducted important research about the hacking tool this year. The exploit mounts a zero-click, or interactionless, attack, meaning that victims don’t need to click a link or grant a permission for the hack to move forward. Project Zero found that ForcedEntry used a series of shrewd tactics to target Apple’s iMessage platform, bypass protections the company added in recent years to make such attacks more difficult, and adroitly take over devices to install NSO’s flagship spyware implant Pegasus.

Apple released a series of patches in September and October that mitigate the ForcedEntry attack and harden iMessage against future, similar attacks. But the Project Zero researchers write in their analysis that ForcedEntry is still “one of the most technically sophisticated exploits we’ve ever seen.” NSO Group has achieved a level of innovation and refinement, they say, that is generally assumed to be reserved for a small cadre of nation-state hackers.

“We haven’t seen an in-the-wild exploit build an equivalent capability from such a limited starting point, no interaction with the attacker’s server possible, no JavaScript or similar scripting engine loaded, etc.,” Project Zero’s Ian Beer and Samuel Groß wrote in an email to WIRED. “There are many within the security community who consider this type of exploitation—single-shot remote code execution—a solved problem. They believe that the sheer weight of mitigations provided by mobile devices is too high for a reliable single-shot exploit to be built. This demonstrates that not only is it possible, it’s being used in the wild reliably against people.”

Advertisement

Apple added an iMessage protection called BlastDoor in 2020’s iOS 14 on the heels of research from Project Zero about the threat of zero-click attacks. Beer and Groß say that BlastDoor does seem to have succeeded at making interactionless iMessage attacks much more difficult to deliver. “Making attackers work harder and take more risks is part of the plan to help make zero-day hard,” they told WIRED. But NSO Group ultimately found a way through.

ForcedEntry takes advantage of weaknesses in how iMessage accepted and interpreted files like GIFs to trick the platform into opening a malicious PDF without a victim doing anything at all. The attack exploited a vulnerability in a legacy compression tool used to process text in images from a physical scanner, enabling NSO Group customers to take over an iPhone completely. Essentially, 1990’s algorithms used in photocopying and scanning compression are still lurking in modern communication software, with all of the flaws and baggage that come with them.

The sophistication doesn’t end there. While many attacks require a so-called command-and-control server to send instructions to successfully placed malware, ForcedEntry sets up its own virtualized environment. The entire infrastructure of the attack can establish itself and run within a strange backwater of iMessage, making the attack even harder to detect. “It’s pretty incredible and, at the same time, pretty terrifying,” the Project Zero researchers concluded in their analysis.

Project Zero’s technical deep dive is significant not just because it explicates the details of how ForcedEntry works but because it reveals how impressive and dangerous privately developed malware can be, says John Scott-Railton, senior researcher at Citizen Lab.

“This is on par with serious nation-state capabilities,” he says. “It’s really sophisticated stuff, and when it’s wielded by an all-gas, no-brakes autocrat, it’s totally terrifying. And it just makes you wonder what else is out there being used right now that is just waiting to be discovered. If this is the kind of threat civil society is facing, it is truly an emergency.”

After years of controversy, there may be growing political will to call out private spyware developers. For example, a group of 18 US congresspeople sent a letter to the Treasury and State Departments on Tuesday calling on the agencies to sanction NSO Group and three other international surveillance companies, as first reported by Reuters.

“This isn’t ‘NSO exceptionalism.’ There are many companies that provide similar services that likely do similar things,” Beer and Groß told WIRED. “It was just, this time, NSO was the company that was caught in the act.”

Source link

Share
Tweet
Pinterest
Linkedin
Stumble
Google+
Email
Prev Article
Next Article

Related Articles

MediaTek’s T750 chipset will power 5G broadband modems and hotspots
As the 5G era has kicked off across the globe, …

MediaTek’s T750 chipset will power 5G broadband modems and hotspots

2020 will be a big year for online childcare — here are 7 startups to watch
TechCrunch ist jetzt Teil der Verizon Media-Familie. Wir (Verizon Media) …

GoFundMe CEO Rob Solomon is stepping down, will be replaced by Tim Cadogan, CEO of OpenX

Leave a Reply Cancel reply

Find us on Facebook

Related Posts

  • Lightfox Games raises $3.3 million for ‘hypercore’ mobile games
    Lightfox Games raises $3.3 million for ‘hypercore’ …
    21/11/2020
  • Microsoft sets Power Automate’s RPA pricing, general availability for April 2
    Microsoft sets Power Automate’s RPA pricing, general …
    03/03/2020
  • Intel’s SGX coughs up crypto keys when scientists tweak CPU voltage
    Intel’s SGX coughs up crypto keys when …
    11/12/2019
  • Beat Saber is now an Oculus studio after Facebook acquisition
    Original Content podcast: ‘The Platform’ offers a …
    04/04/2020
  • AI Weekly: The election
    AI Weekly: The election
    07/11/2020

Popular Posts

  • 10 Unusual Tombs from Around the World …
    26/06/2022 0
  • 10 Eerie Real-Life Paranormal Encounters to Creep …
    29/05/2022 0
  • The mystery of China’s sudden warnings about US hackers
    The mystery of China’s sudden warnings about …
    29/05/2022 0
  • 10 Huge Problems Animals Should Have But …
    30/05/2022 0
  • 10 U.S. Towns with Terrifying Local Legends …
    30/05/2022 0

viralamo

Pages

  • Contact Us
  • Privacy Policy
Copyright © 2022 viralamo
Theme by MyThemeShop.com

Ad Blocker Detected

Our website is made possible by displaying online advertisements to our visitors. Please consider supporting us by disabling your ad blocker.

Refresh