this post was submitted on 27 Dec 2023
52 points (96.4% liked)

Privacy

1229 readers
67 users here now

Icon base by Lorc under CC BY 3.0 with modifications to add a gradient

founded 1 year ago
MODERATORS
all 5 comments
sorted by: hot top controversial new old
[–] MotoAsh@lemmy.world 3 points 10 months ago (1 children)

I know they used zero-day exploits, but the wording kinda' sounds like they left a back door in and were simply hoping no one would find it. Hilarious.

[–] PsychedSy@sh.itjust.works 4 points 10 months ago

I mean they kind of did. They're prolly in the middle of an investigation as to why they shipped hardware with some registers/memory outside all of their memory protection. It'd also be kind of hard to find.

[–] autotldr@lemmings.world 1 points 10 months ago

This is the best summary I could come up with:


Researchers on Wednesday presented intriguing new findings surrounding an attack that over four years backdoored dozens if not thousands of iPhones, many of which belonged to employees of Moscow-based security firm Kaspersky.

Chief among the discoveries: the unknown attackers were able to achieve an unprecedented level of access by exploiting a vulnerability in an undocumented hardware feature that few if anyone outside of Apple and chip suppliers such as ARM Holdings knew of.

“The exploit's sophistication and the feature's obscurity suggest the attackers had advanced technical capabilities,” Kaspersky researcher Boris Larin wrote in an email.

“Our analysis hasn't revealed how they became aware of this feature, but we're exploring all possibilities, including accidental disclosure in past firmware or source code releases.

A fresh infusion of details disclosed Wednesday said that “Triangulation”—the name Kaspersky gave to both the malware and the campaign that installed it—exploited four critical zero-day vulnerabilities, meaning serious programming flaws that were known to the attackers before they were known to Apple.

The researchers found that several of MMIO addresses the attackers used to bypass the memory protections weren’t identified in any device tree documentation, which acts as a reference for engineers creating hardware or software for iPhones.


The original article contains 653 words, the summary contains 200 words. Saved 69%. I'm a bot and I'm open source!

[–] onlinepersona@programming.dev 1 points 10 months ago

What an exploit chain... damn. Someday, I'd love to hear on podcast just how they got this working and found this chain.

CC BY-NC-SA 4.0