{"id":30164,"date":"2024-01-03T11:35:29","date_gmt":"2024-01-03T19:35:29","guid":{"rendered":"https:\/\/www.podfeet.com\/blog\/?p=30164"},"modified":"2024-01-03T11:37:21","modified_gmt":"2024-01-03T19:37:21","slug":"sb-2024-01-03","status":"publish","type":"post","link":"https:\/\/www.podfeet.com\/blog\/2024\/01\/sb-2024-01-03\/","title":{"rendered":"Security Bits \u2014 3 January 2024 (Bart &#038; Jill from the North Woods)"},"content":{"rendered":"<h2>Deep Dive \u2014 Operation Triangulation<\/h2>\n<p><em><strong>TL;DR<\/strong> \u2014 Kaspersky labs have discovered that they, and Russian government officials, were targeted by very advanced iOS malware that completely took over iOS devices for the last 4 years. Apple have patched all the exploited vulnerabilities, regular users were not targeted, and Kaspersky say there is not enough evidence to link the exploit to any particular group or government.<\/em><\/p>\n<p>The Ars Technica Writeup by Dan Goodin linked below gives the best-detailed summary I have read, so I won&#8217;t try duplicating it, instead, I want to highlight the key facts we know:<\/p>\n<ol>\n<li>The attacks were in use and went undetected for 4 years<\/p>\n<\/li>\n<li>\n<p>The attacks were very tightly targeted to keep them secret for as long as possible, this is why regular users don&#8217;t need to worry.<\/p>\n<\/li>\n<li>\n<p>The attacks were delivered via iMessage, and the malware was able to infect the device without any user interaction, i.e. they were <em>zero-click<\/em><\/p>\n<\/li>\n<li>\n<p>The attacks did not survive a reboot, but victims were regularly re-infected with fresh malicious iMessages<\/p>\n<\/li>\n<li>\n<p>Because of how many layers of security Apple have added to iOS, the attackers needed four zero-day vulnerabilities to work around Address Space Layout Randomisation and hardware kernel protections \u2014 a bug in TrueType, a kernel bug, a previously unknown un-documented hardware feature\/bug, and a Safari bug<\/p>\n<\/li>\n<li>\n<p>The hardware feature\/bug is the most mysterious, here is what Kaspersky concluded:<\/p>\n<blockquote><p>\n  &#8220;Our guess is that this unknown hardware feature was most likely  intended to be used for debugging or testing purposes by Apple  engineers or the factory, or that it was included by mistake&#8221;\n<\/p><\/blockquote>\n<\/li>\n<li>Apple have patched all four vulnerabilities, including the hardware bug<\/p>\n<\/li>\n<li>\n<p>Security researchers are describing this as the most advanced attack they have ever seen, so this is clearly a big operation backed by very substantial resources, so probably a nation-state or a group of nation-states, but no one knows who. This is the most Kaspersky would conclude:<\/p>\n<blockquote><p>\n  &#8220;Currently, we cannot conclusively attribute this cyberattack to any known threat actor \u2026 The unique characteristics observed in Operation Triangulation don&#8217;t align with patterns of known campaigns, making attribution challenging at this stage&#8221;\n<\/p><\/blockquote>\n<\/li>\n<\/ol>\n<p>More details may emerge as time goes on, but for now, any claims that a specific government or group were responsible, or any assertions that Apple did this intentionally are pure speculation, so don&#8217;t fall for the click-bait.<\/p>\n<p>Also note that the fact that this was so difficult to pull off proves how hard Apple are working to harden the iPhone.<\/p>\n<p>Finally, remember that the probability than any NosillaCastaway was in any way affected by these vulnerabilities is so low as to be effectively zero \u2014 billion dollar exploits are not wasted on regular folk like us!<\/p>\n<h3>Links:<\/h3>\n<ul>\n<li>An excellent writeup from Dan Goodin: <a href=\"https:\/\/arstechnica.com\/security\/2023\/12\/exploit-used-in-mass-iphone-infection-campaign-targeted-secret-hardware-feature\/\">4-year campaign backdoored iPhones using possibly the most advanced exploit ever \u2014 arstechnica.com\/\u2026<\/a><\/li>\n<li>The original report from Kaspersky: <a href=\"https:\/\/securelist.com\/operation-triangulation-the-last-hardware-mystery\/111669\/\">Operation Triangulation: The last (hardware) mystery \u2014 securelist.com\/\u2026<\/a><\/li>\n<\/ul>\n<h2>\u2757 Action Alerts<\/h2>\n<aside class=\"small-aside\">Calls to action, if any stories in this section are relevant to you there is some action you should take.<\/aside>\n<ul>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/do-this-now-update-chrome-to-patch-8th-zero-day-of-2023\/\">Patch now: Update Chrome to fix 8th zero-day of 2023 \u2014 www.intego.com\/\u2026<\/a><\/li>\n<li>Apple has released macOS Sonoma 14.2.1 which contains one security fix \u2014 <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-sonoma-14-2-1-patches-1-vulnerability-leaves-others-unpatched\/\">www.intego.com\/\u2026<\/a><\/li>\n<\/ul>\n<h2>Worthy Warnings<\/h2>\n<aside class=\"small-aside\">Potentially relevant warnings from government organisations, public interest groups, or the security community.<\/aside>\n<ul>\n<li>A good reminder why software piracy is dangerous: <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/fake-vpn-chrome-extensions-force-installed-15-million-times\/\">Fake VPN Chrome extensions force-installed 1.5 million times \u2014 www.bleepingcomputer.com\/\u2026<\/a><br \/>\n<blockquote><p>\n  According to ReasonLabs, which discovered the malicious extensions, they are spread via an installer hidden in pirated copies of popular video games like Grand Theft Auto, Assassins Creed, and The Sims 4, which are distributed from torrent sites.\n<\/p><\/blockquote>\n<\/li>\n<li><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/easypark-discloses-data-breach-that-may-impact-millions-of-users\/\">EasyPark discloses data breach that may impact millions of users \u2014 www.bleepingcomputer.com\/\u2026<\/a>\n<ul>\n<li>No passwords or full payment details, but names, addresses, and partial credit\/debit card numbers or IBANs \u2014 biggest risk is automated targeted and convincing phishing<\/li>\n<li>An interesting detail is how customers are being notified \u2014 with in-app notifications (if you think you might be affected, just open the app, and if you are, it will tell you so)<\/li>\n<\/ul>\n<\/li>\n<li>Free iCloud storage scams seem to be on the rise, possibly because attackers know Santa delivered a lot of new iOS devices recently: <a href=\"https:\/\/www.intego.com\/mac-security-blog\/dont-fall-for-icloud-free-storage-notice-email-scams\/\">Don&#8217;t fall for &#8220;iCloud FREE Storage Notice&#8221; email scams \u2014 www.intego.com\/\u2026<\/a><\/p>\n<\/li>\n<\/ul>\n<h2>Notable News<\/h2>\n<ul>\n<li>\n<p>An example of a trend in modern ransomware attacks we should be aware of \u2014 ransoming the exposed users when the company doesn&#8217;t pay up:   <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/integris-health-patients-get-extortion-emails-after-cyberattack\/\">Integris Health patients get extortion emails after cyberattack \u2014 www.bleepingcomputer.com\/\u2026<\/a> (OK&#8217;s biggest not-for-profit healthcare network)<\/p>\n<\/li>\n<li>\n<p>Google Chrome&#8217;s <em>Safety Check<\/em> feature is being expanded and will run automatically in the background on desktop versions of the browser \u2014 <a href=\"https:\/\/www.bleepingcomputer.com\/news\/google\/google-chrome-now-scans-for-compromised-passwords-in-the-background\/\">www.bleepingcomputer.com\/\u2026<\/a><\/p>\n<blockquote><p>\n  Safety Check compares login credentials against those exposed in data leaks. It also checks for weak and easy-to-guess passwords that expose users to brute-force attacks or password-cracking attempts.<\/p>\n<p>  \u2026<\/p>\n<p>  Google will broaden Safety Check&#8217;s functionality to automatically revoke permissions, such as access to the users&#8217; location or microphone, for websites that haven&#8217;t been visited for a long time\n<\/p><\/blockquote>\n<\/li>\n<\/ul>\n<h2>Legend<\/h2>\n<p>When the textual description of a link is part of the link it is the title of the page being linked to, when the text describing a link is not part of the link it is a description written by <a href=\"https:\/\/bartb.ie\/\">Bart<\/a>.<\/p>\n<table>\n<thead>\n<tr>\n<th align=\"center\">Emoji<\/th>\n<th align=\"left\">Meaning<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td align=\"center\"><\/td>\n<td align=\"left\">A link to <strong>audio content<\/strong>, probably a podcast.<\/td>\n<\/tr>\n<tr>\n<td align=\"center\">\u2757<\/td>\n<td align=\"left\">A <strong>call to action<\/strong>.<\/td>\n<\/tr>\n<tr>\n<td align=\"center\"><em>flag<\/em><\/td>\n<td align=\"left\">The story is particularly relevant to people living in a <strong>specific country<\/strong>, or, the organisation the story is about is affiliated with the government of a specific country.<\/td>\n<\/tr>\n<tr>\n<td align=\"center\"><\/td>\n<td align=\"left\">A link to <strong>graphical content<\/strong>, probably a chart, graph, or diagram.<\/td>\n<\/tr>\n<tr>\n<td align=\"center\"><\/td>\n<td align=\"left\">A story that has been <strong>over-hyped<\/strong> in the media, or, <em>&#8220;no need to light your hair on fire&#8221;<\/em><\/td>\n<\/tr>\n<tr>\n<td align=\"center\"><\/td>\n<td align=\"left\">A link to an article behind a <strong>paywall<\/strong>.<\/td>\n<\/tr>\n<tr>\n<td align=\"center\"><\/td>\n<td align=\"left\">A <strong>pinned<\/strong> story, i.e. one to keep an eye on that&#8217;s likely to develop into something significant in the future.<\/td>\n<\/tr>\n<tr>\n<td align=\"center\"><\/td>\n<td align=\"left\">A <strong><em>tip of the hat<\/em><\/strong> to thank a member of the community for bringing the story to our attention.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>Deep Dive \u2014 Operation Triangulation TL;DR \u2014 Kaspersky labs have discovered that they, and Russian government officials, were targeted by very advanced iOS malware that completely took over iOS devices for the last 4 years. Apple have patched all the exploited vulnerabilities, regular users were not targeted, and Kaspersky say there is not enough evidence [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":28385,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[147,214],"tags":[6161,6162,2137,50,569,142,1968],"class_list":["post-30164","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-posts","category-security-bits","tag-operation-triangulation","tag-piracy","tag-ransomware","tag-security","tag-security-bits","tag-vpn","tag-zero-day"],"jetpack_featured_media_url":"https:\/\/www.podfeet.com\/blog\/wp-content\/uploads\/2023\/05\/Security-Bits-Logo_1040x520.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/30164","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/comments?post=30164"}],"version-history":[{"count":3,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/30164\/revisions"}],"predecessor-version":[{"id":30167,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/30164\/revisions\/30167"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/media\/28385"}],"wp:attachment":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/media?parent=30164"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/categories?post=30164"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/tags?post=30164"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}