Search

Google warns that NSO hacking is on par with elite nation-state spies - Ars Technica

A man walks by the building entrance of Israeli cyber company NSO Group at one of its branches in the Arava Desert on November 11, 2021, in Sapir, Israel.
Enlarge / A man walks by the building entrance of Israeli cyber company NSO Group at one of its branches in the Arava Desert on November 11, 2021, in Sapir, Israel.
Amir Levy | Getty Images

The Israeli spyware developer NSO Group has shocked the global security community for years with aggressive and effective hacking toolsthat can target both Android and iOS devices. The company's products have been so abused by its customers around the world that NSO Group now faces sanctions, high-profile lawsuits, and an uncertain future. But a new analysis of the spyware maker's ForcedEntry iOS exploit—deployed in a number of targeted attacks against activists, dissidents, and journalists this year—comes with an even more fundamental warning: Private businesses can produce hacking tools that have the technical ingenuity and sophistication of the most elite government-backed development groups.

Google's Project Zero bug-hunting group analyzed ForcedEntry using a sample provided by researchers at the University of Toronto's Citizen Lab, which published extensively this year about targeted attacks utilizing the exploit. Researchers from Amnesty International also conducted important research about the hacking tool this year. The exploit mounts a zero-click, or interactionless, attack, meaning that victims don't need to click a link or grant a permission for the hack to move forward. Project Zero found that ForcedEntry used a series of shrewd tactics to target Apple's iMessage platform, bypass protections the company added in recent years to make such attacks more difficult, and adroitly take over devices to install NSO's flagship spyware implant Pegasus.

Apple released a series of patches in September and October that mitigate the ForcedEntry attack and harden iMessage against future, similar attacks. But the Project Zero researchers write in their analysis that ForcedEntry is still “one of the most technically sophisticated exploits we've ever seen.” NSO Group has achieved a level of innovation and refinement, they say, that is generally assumed to be reserved for a small cadre of nation-state hackers.

“We haven't seen an in-the-wild exploit build an equivalent capability from such a limited starting point, no interaction with the attacker's server possible, no JavaScript or similar scripting engine loaded, etc.,” Project Zero's Ian Beer and Samuel Groß wrote in an email to WIRED. “There are many within the security community who consider this type of exploitation—single-shot remote code execution—a solved problem. They believe that the sheer weight of mitigations provided by mobile devices is too high for a reliable single-shot exploit to be built. This demonstrates that not only is it possible, it's being used in the wild reliably against people.”

Apple added an iMessage protection called BlastDoor in 2020’s iOS 14 on the heels of research from Project Zero about the threat of zero-click attacks. Beer and Groß say that BlastDoor does seem to have succeeded at making interactionless iMessage attacks much more difficult to deliver. “Making attackers work harder and take more risks is part of the plan to help make zero-day hard,” they told WIRED. But NSO Group ultimately found a way through.

ForcedEntry takes advantage of weaknesses in how iMessage accepted and interpreted files like GIFs to trick the platform into opening a malicious PDF without a victim doing anything at all. The attack exploited a vulnerability in a legacy compression tool used to process text in images from a physical scanner, enabling NSO Group customers to take over an iPhone completely. Essentially, 1990's algorithms used in photocopying and scanning compression are still lurking in modern communication software, with all of the flaws and baggage that come with them.

The sophistication doesn't end there. While many attacks require a so-called command-and-control server to send instructions to successfully placed malware, ForcedEntry sets up its own virtualized environment. The entire infrastructure of the attack can establish itself and run within a strange backwater of iMessage, making the attack even harder to detect. “It's pretty incredible and, at the same time, pretty terrifying,” the Project Zero researchers concluded in their analysis.

Project Zero's technical deep dive is significant not just because it explicates the details of how ForcedEntry works but because it reveals how impressive and dangerous privately developed malware can be, says John Scott-Railton, senior researcher at Citizen Lab.

“This is on par with serious nation-state capabilities,” he says. “It's really sophisticated stuff, and when it's wielded by an all-gas, no-brakes autocrat, it's totally terrifying. And it just makes you wonder what else is out there being used right now that is just waiting to be discovered. If this is the kind of threat civil society is facing, it is truly an emergency.”

After years of controversy, there may be growing political will to call out private spyware developers. For example, a group of 18 US congresspeople sent a letter to the Treasury and State Departments on Tuesday calling on the agencies to sanction NSO Group and three other international surveillance companies, as first reported by Reuters.

“This isn’t ‘NSO exceptionalism.’ There are many companies that provide similar services that likely do similar things,” Beer and Groß told WIRED. “It was just, this time, NSO was the company that was caught in the act."

Adblock test (Why?)

Article From & Read More ( Google warns that NSO hacking is on par with elite nation-state spies - Ars Technica )
https://ift.tt/3Fc9n89
Technology

Bagikan Berita Ini

0 Response to "Google warns that NSO hacking is on par with elite nation-state spies - Ars Technica"

Post a Comment

Powered by Blogger.