Der #DarkAgent-#Podcast beim #DeutschlandFunk ist jetzt auch via #RSS verfügbar: https://www.deutschlandfunk.de/dark-avenger-100.html
Anhören! 🎧
Der #DarkAgent-#Podcast beim #DeutschlandFunk ist jetzt auch via #RSS verfügbar: https://www.deutschlandfunk.de/dark-avenger-100.html
Anhören! 🎧
Interessante 2teilige Doku über staatliches #hacking / #cracking, #Russland, #Kaspersky, #Lettland, #OperationTriangulation
Wieder mal eine #Hörempfehlung im Bereich #Podcast: Die Podcast-Reihe #DarkAgent präsentiert die lange Recherche mehrere Journalist:innen zu #OperationTriangulation, einen der umfassendsten und mysteriösesten Angriffe auf Smartphones bzw. iPhones – auch bekannt aus diesem Vortrag beim #37c3: https://media.ccc.de/v/37c3-11859-operation_triangulation_what_you_get_when_attack_iphones_of_researchers
Merkwürdigerweise will #Kaspersky nicht mehr so gern, dass ihre Mitarbeiter:innen über das Thema sprechen. 👀 Was genau hinter dem Angriff steckt, ist unklar.
Bisher zwei Folgen verfügbar, erst ab Montag auch frei per #RSS. jeden Montag eine neue Folge.
https://www.deutschlandfunk.de/dark-avenger-100.html
Group-IB explains precautionary and investigation measures to detect Pegasus spyware Operation Triangulation, Predator spyware, and others on an iOS device. Indicators are from historical reporting. 🔗 https://www.group-ib.com/blog/pegasus-spyware/
Having studied what @Kaspersky found when they dismantled the malware known as #operationtriangulation, I believe it is clear that Apple designed functionality onto the SoC from Bionic A12 to A16 for a purpose.
There are links to the fanstatic forensic work by Kaspersky researchers in my opinion piece, kudos to them for exploring all avenues to get answers.
This is possibly the best malware every chained together and Apple would never have intended the feature - burned into their chips - to be abused like this.
Most Sophisticated iPhone Hack Ever Exploited Apple's Hidden Hardware Feature
The starting point of the zero-click attack is an iMessage bearing a malicious attachment, which is automatically processed sans any user interaction to ultimately obtain elevated permissions and deploy a spyware module.
#apple #Iphone #ios #imessage #zeroday #zeroclick #OperationTriangulation #spyware #malware #security #cybersecurity #infosec #hackers #hacking #hacked
https://thehackernews.com/2023/12/most-sophisticated-iphone-hack-ever.html
#OperationTriangulation > Ein Detail im bisher ausgeklügeltsten Angriff auf iPhones sorgt nun für schwere Vorwürfe gegen Apple. Geheime Register erlaubten das Umschiffen zentraler Sicherheitsfunktionen https://www.derstandard.at/story/3000000201983/aufregung-um-vermeintliche-hintertuer-in-apple-chips-fuer-iphones-und-macs
# 37C3 - Operation Triangulation: What You Get When Attack iPhones of Researchers
https://www.youtube.com/watch?v=1f6YyH62jFE
The malware injected by #OperationTriangulation is called #TriangleDB. That clearly points to the author of this attack: It *must* be Otto von Schirach!
Courtesy of Kaspersky:
Our experts discovered a flaw in Apple's system, a key factor in the recent #spyware attacks targeting #iPhone users, known as #OperationTriangulation.
This flaw enables attackers to bypass the iPhone's hardware-based memory protection. Full report ⇒ https://kas.pr/t3s6
Covered in #securitynow 995 I knew I had to watch this talk I did not catch at the venue.
https://media.ccc.de/v/37c3-11859-operation_triangulation_what_you_get_when_attack_iphones_of_researchers
Glad I listened to @SGgrc beforehand as he put it into more digestable language and a sober context.
The talk starts with low-level code deepdives out of the gate. Truetype fonts are turing complete?!
Thank you @oct0xor kucher1n bzvr_
New Cybersecurity Roundup:
Someone tried to hack Kaspersky via a complex iPhone attack (“Operation Triangulation”); Jake Appelbaum got (reluctantly) kicked out of CCC; NASA launched a cybersecurity guide for the space industry; India’s Prime Minister Narendra Modi tried to strongarm and retaliate against Apple over hacking warnings, plus early Pandemic Roundup items.
Link: https://www.patreon.com/posts/cybersecurity-2-95718700
#Cybersecurity #Infosec #Hacking #Hacks #CCC #NASA #Apple #Kaspersky #OperationTriangulation
What the history of OpenBoot, Phrack, Mudge & Solaris, can teach us about the wisdom (or not) of Apple’s building their iPhone security debugging-backdoor-NSA-hack thing
In the days before people really, really, cared about security — when it was more amazing that mainstream computers worked at all rather than that they offered falsifiable guarantees about privacy and integrity, and most of all in the days before hackerdom decided that it would be great if all the world’s computation ran on “…surely 640Kb is enough for anyone?” glorified MS-DOS personal computers rather than on architectures specifically designed to carry the weight of “big data”… back in those days there was the concept of a monitor.
By monitor we don’t mean VDU nor LCD screen, but instead that what you considered to be your entire computer operating system was something which could be paused, inspected, poked, amended, restarted or halted, all by a little parasitic computer system which probably polled the device tree and booted it up in the first place. The consequence of the monitor was that — beyond being a mere “boot loader” — you were essentially running your entire operating system kernel under a live debugger on a 24×7 basis.
This “debugger” was the monitor; sometimes it was separate hardware, sometimes it was just a firmware-level subsystem with which you could interrupt your operating system at any point, and call back into. At Sun Microsystems (in particular, but much the same was available elsewhere) the monitor evolved into a complete and flexible little solution called OpenBoot, which subsequently became a PCI standard (it is/was(?) even in MacOS) and it was massively powerful.
Unfortunately: with great power comes great responsibility, which (per the first paragraph) people were not really aware of, yet.
So, in July 1998, Mudge posted in Phrack an article titled “FORTH Hacking on Sparc Hardware” explaining how to use the monitor to change the UID of your shell process to be zero/the root user:
Fire up the trusty OpenBoot system via L1-A and get the pointer to thecred structure via :ok hex f5e09000 18 + l@ .f5a99858ok goNow, get the effective user id byok hex f5a99858 4 + l@ .309 (309 hex == 777 decimal)ok goOf course you want to change this to 0 (euid root):ok hex 0 f5a99858 4 + l!ok gocheck your credentials!Alliant+ iduid=777(mudge) gid=1(other) euid=0(root)
tl;dr — press some keys, type a magic incantation in Forth and you become “root”
Let’s just say that OpenBoot was a very powerful and essential medicine… but that provision of that power caused security side-effects/issues that were not going to go away in any short period of time. An excellent little white paper from GIAC provided a synopsis and context from a few years later, in 2001.
The technique of elevating user privileges by manually editing system runtime memory is an exploit that can be used to subvert all operating system security measures. This vulnerability is not operating system platform specific and exists in all computer hardware that utilizes a programmable firmware component for hardware control and bootstrapping procedures. This paper will explain this vulnerability as a class of exploit and utilize the SUN Microsystems’ OpenBoot programmable ROM (PROM) and Solaris as a technical example.
Speaking as one of the people who had to clean up the mess: we/Sun Microsystems should have done a lot more to mitigate the ability of people to get at this powerful medicine; this issue was significant amongst others which drove Sun’s internal security community to create and force the adoption of the “Secure By Default” initiative, and to formalise customer provision and promote adoption of the Solaris Security Toolkit which (amongst many other configuration changes) locked-down several different routes by which the OpenBoot monitor could be exploited.
From the perspective of 2023: this all should have happened 5, perhaps 10 years before Mudge’s posting, but there was neither the corporate will — nor customer will/expertise — to address the matter at that time.
So when I look at Apple, and there’s an apparent hardware debugging widget in the memory which can be driven by undocumented means to poke the entire system, for a device which they are literally advertising as robust and secure, my reactions are basically:
#apple #essay #mudge #openboot #operationTriangulation #sunMicrosystems
What the history of OpenBoot, Phrack, Mudge & Solaris, can teach us about the wisdom (or not) of Apple’s building their iPhone security debugging-backdoor-NSA-hack thing
https://alecmuffett.com/article/108789
#OperationTriangulation #SunMicrosystems #apple #mudge #openboot
You probably already seen it if you are into these things, but this is an interesting breakdown of how researchers uncovered #OperationTriangulation (a year long spying campaign targeting #iPhone users leveraging previously unknown exploits in #iOS)
Very good blog on mobile malware: Operation Triangulation: The last (hardware) mystery https://securelist.com/operation-triangulation-the-last-hardware-mystery/111669/ by @kaspersky #operationtriangulation #triangulation #mobile #CyberSecurity
#OperationTriangulation research uncovers new details of fantastic attack chain.
A zero click RCE, chaining four zero days over four years was one hell of an achievement. Yevgeny “Eugene” Valentinovich Kaspersky’s team call it “definitely the most sophisticated attack chain we have ever seen.”
But does that prove #Apple colluded with the #NSA? In #SBBlogwatch, we DO believe the hype. At @TechstrongGroup’s @SecurityBlvd: https://securityboulevard.com/2023/12/nsa-iphone-backdoor-triangulation-richixbw/?utm_source=richisoc&utm_medium=social&utm_content=richisoc&utm_campaign=richisoc
Operation Triangulation: "Raffiniertester Exploit aller Zeiten" auf iPhones | heise online
https://heise.de/-9583427 #iPhones #Exploit #OperationTriangulation
In the light of the brilliant #operationtriangulation research, it has to be said, that often the forensic capabilities stand on the shoulders of underfunded but immensely useful tools, like MVT. It was initially built by the Amnesty International Security Lab and already proofed its worth in the #pegasus spyware research.
Please consider donating to Amnesty International Deutschland, who is funding this project. @ https://helfen.amnesty.de/
Die Spyware-Angriffe der #OperationTriangulation, die seit 2019 auf #iPhones abzielen, nutzten undokumentierte Funktionen in Apple-Chips, um hardwarebasierte Sicherheitsvorkehrungen zu umgehen: https://winfuture.de/news,140330.html?utm_source=Mastodon&utm_medium=ManualStatus&utm_campaign=SocialMedia