The Mercury News Weekend

Apple boosts iPhone security

S.F.-based security firm calls program highly sophistica­ted

- By Raphael Satter and Daniella Cheslow

PARIS — A botched attempt to break into the iPhone of an Arab activist using hitherto unknown espionage software has triggered a global upgrade of Apple’s mobile operating system, researcher­s said Thursday.

The spyware took advantage of three previously undisclose­d weaknesses in Apple’s mobile operating system to take complete control of iPhone devices, according to reports published Thursday by the San Francisco-based Lookout smartphone security company and internet watchdog group Citizen Lab. Both reports fingered the NSO Group, an Israeli company with a reputation for flying under the radar, as the author of the spyware.

“The threat actor has never been caught before,” said Mike Murray, a researcher with Lookout, describing the program as “the most sophistica­ted spyware package we have seen in the market.”

The reports issued by Lookout and Citizen Lab — based at the University of Toronto’s Munk School of Global Affairs — outlined how an iPhone could be completely compromise­d with the tap of a finger, a trick so coveted in the world of cyberespio­nage that in November a spyware broker said it had paid a $1 million dollar bounty to programmer­s who’d found a way to do it. Such a compromise would give hackers full control over the phone, allowing them to eavesdrop on calls, harvest messages, activate cameras and microphone­s and drain the device of its personal data.

Arie van Deursen, a professor of software engineerin­g at Delft University of Technology in the Netherland­s, said both reports were credible and disturbing. Forensics expert Jonathan Zdziarski described the malicious program as a “serious piece of spyware.”

Apple said in a statement that it fixed the vulnerabil­ity immediatel­y after learning about it, but the security hole may have gone unpatched had it not been for the wariness of an embattled human rights activist in the United Arab Emirates.

Ahmed Mansoor, a wellknown human rights defender, first alerted Citizen Lab to the spyware after receiving an unusual text message on Aug. 10. Promising to reveal details about torture in the United Arab Emirates’ prisons, the unknown sender included a suspicious-looking link at the bottom of the message.

Mansoor wasn’t convinced. Not only had he been imprisoned, beaten, robbed and had his passport confiscate­d by the authoritie­s over the years, Mansoor had also repeatedly found himself in the crosshairs of electronic eavesdropp­ing operations. In fact Mansoor already had the dubious distinctio­n of having weathered attacks from two separate brands of commercial spyware. And when he shared the suspicious text with Citizen Lab researcher Bill Marczak, they realized he’d been targeted by a third.

Marczak, who’d already been looking into the NSO Group, said he and fellow-researcher John Scott-Railton turned to Lookout for help picking apart the malicious program, a process which Murray compared to “defusing a bomb.”

“It is amazing the level they’ve gone through to avoid detection,” he said of the software’s makers. “They have a hair-trigger self-destruct.”

Working feverishly over a two-week period, the researcher­s found that Mansoor had been targeted by an unusually sophistica­ted piece of software which likely cost a small fortune to arm.

“It is amazing the level they’ve gone through to avoid detection. They have a hair-trigger self-destruct.” — Mike Murray, researcher, Lookout

C11

 ?? JON GAMBRELL/ASSOCIATED PRESS ?? Human rights activist Ahmed Mansoor alerted Citizen Lab to the spyware after he received an unusual text message promising to reveal details about torture in UAE prisons.
JON GAMBRELL/ASSOCIATED PRESS Human rights activist Ahmed Mansoor alerted Citizen Lab to the spyware after he received an unusual text message promising to reveal details about torture in UAE prisons.

Newspapers in English

Newspapers from United States