Toronto Star

Researcher­s uncover iPhone hack

Malicious websites exploited software for at least 2 years

- TAYLOR TELFORD

Security researcher­s at Google uncovered a “sustained” — at least two years — and indiscrimi­nate campaign to hack iPhones through certain websites, allowing attackers to steal messages, files and track location data every 60 seconds.

In a deep-dive blog post published last week, Ian Beer, a security expert on Google’s Project Zero, detailed how hackers had been using malicious websites to exploit an iPhone software vulnerabil­ity. The post did not name the websites or say how many people were victimized.

“There was no target discrimina­tion; simply visiting the hacked site was enough for the exploit server to attack your device, and if it was successful, install a monitoring implant,” Beer wrote. “We estimate that these sites receive thousands of visitors per week. “

The implant also collected password key chains, messages, address books and other personal informatio­n from users’ apps, including WhatsApp, Telegram and Gmail. This type of widespread yet random attack is rare and it may be one of the biggest attacks ever on iPhone users. But there was a limit to the malware’s power — it was erased if the

iPhone was restarted, freeing the user unless they returned to one of the malicious websites.

Apple did not immediatel­y respond to a request for comment. As Google’s external security team, Project Zero researcher­s are dispatched to find all manner of weaknesses in popular technology. Since it was created in July 2014, the team has found and reported nearly 1,600 hardware and software vulnerabil­ities. But Project Zero has taken heat for its tough tactics: After reporting a bug, the team gives the vendor 90 days to fix it before Project Zero discloses the details publicly. Project Zero said that about 95 per cent of the bugs it finds and reports are patched before the 90-day deadline.

But when Project Zero informed Apple of the breach on Feb. 1, it gave it seven days to fix it, citing the need for urgency. The iPhone maker released iOS 12.1.4 on Feb. 7. Apple is notoriousl­y guarded with its products, shielding them from even wellmeanin­g hackers looking to probe iOS vulnerabil­ities. But the company gradually opened its products up to researcher­s and recently announced plans to release a hacker-friendly phone to certain experts in the interest of uncovering vulnerabil­ities more quickly.

And at the Black Hat security conference in Las Vegas last month, Apple’s head of security engineerin­g said the company will pay as much as $1.5 million (U.S.) for a “bug bounty” to any researcher who discovers iOS attack techniques and discreetly reports them to Apple.

In the blog post, Beer wrote that he didn’t want to try to put a price tag on the attacks, but said that “$1 million, $2 million, or $20 million” seemed low given the attackers’ ability to “monitor the private activities of entire population­s in real time.” And while this hacking operation ultimately failed as it was discovered by Project Zero, Beer made it clear that there are almost certainly more lurking and preying on people.

“All that users can do is be conscious of the fact that mass exploitati­on still exists and behave accordingl­y; treating their mobile devices as both integral to their modern lives, yet also as devices which when compromise­d, can upload their every action into a database to potentiall­y be used against them.”

 ??  ?? A campaign to hack iPhones through malicious websites collected passwords, messages, address books and other personal informatio­n.
A campaign to hack iPhones through malicious websites collected passwords, messages, address books and other personal informatio­n.

Newspapers in English

Newspapers from Canada