• 0 replies ( Post Reply )

    Mimi Jasper
    Mimi Jasper

    self employed

    7 months ago

    When you think about how hackers could break into your smartphone, you probably imagine it would start with clicking a malicious link in a text, downloading a fraudulent app, or some other way you accidentally let them in. It turns out that's not necessarily so—not even on the iPhone, where simply receiving an iMessage could be enough to get yourself hacked.At the Black Hat security conference in Las Vegas on Wednesday, Google Project Zero researcher Natalie Silvanovich is presenting multiple so-called “interaction-less” bugs in Apple’s iOS iMessage client that could be exploited to gain control of a user’s device. And while Apple has already patched five of them, a few have yet to be patched.“These can be turned into the sort of bugs that will execute code and be able to eventually be used for weaponized things like accessing your data,” Silvanovich says. “So the worst-case scenario is that these bugs are used to harm users.”LILY HAY NEWMAN COVERS INFORMATION SECURITY, DIGITAL PRIVACY, AND HACKING FOR WIRED.Silvanovich, who worked on the research with fellow Project Zero member Samuel Groß, got interested in interaction-less bugs because of a recent, dramatic WhatsApp vulnerability that allowed nation-state spies to compromise a phone just by calling it—even if the recipient didn’t answer the call.But when she looked for similar issues in SMS, MMS, and visual voicemail, she came up empty. Silvanovich had assumed that iMessage would be a more scrutinized and locked-down target, but when she started reverse engineering and looking for flaws, she quickly found multiple exploitable bugs.This may be because iMessage is such a complex platform that offers an array of communication options and features. It encompasses Animojis, rendering files like photos and videos, and integration with other apps—everything from Apple Pay and iTunes to Fandango and Airbnb. All of these extensions and interconnections increase the likelihood of mistakes and weaknesses.One of the most interesting interaction-less bugs Silvanovich found was a fundamental logic issue that could have allowed a hacker to easily extract data from a user’s messages. An attacker could send a specially crafted text message to a target, and the iMessage server would send specific user data back, like the content of their SMS messages or images. The victim wouldn't even have to open their iMessage app for the attack to work. iOS has protections in place that would usually block an attack like this, but because it takes advantage of the system's underlying logic, iOS’ defenses interpret it as legitimate and intended.

      “Maybe this is an area that gets missed in security,” Silvanovich says. “There’s a huge amount of focus on implementation of protections like cryptography, but it doesn’t matter how good your crypto is if the program has bugs on the receiving end.”The best thing you can do to protect yourself against interaction-less attacks is keep your phone operating system and apps updated; Apple patched all six of the iMessage bugs Silvanovich is presenting in the recently released iOS 12.4, and in macOS 10.14.6. But beyond that, it’s up to developers to avoid introducing these types of bugs in their code, or spot them as quickly as possible. Given how inexorable interaction-less attacks can be, there’s not a lot users can do to stop them once malicious messages or calls start pouring in.More Great WIRED Stories

    NEWSLETTERSubmit MOST POPULARSCIENCESpaceIL’s Crashed Spacecraft Spilled Tardigrades on the MoonDANIEL OBERHAUS TRANSPORTATIONA Boeing 737 MAX Test Flight Had Its Ups and DownsALEX DAVIES SCIENCEA Decades-Old Computer Science Puzzle Was Solved in Two PagesERICA KLARREICH TRANSPORTATIONNow on the Used Car Lot: Great Electric Vehicles for CheapALEX DAVIES GEARThe Apple Card Is Now Available. Here Are the DetailsARIELLE PARDES GEARDigital Textbooks Are Forcing a Radical Shift in Higher EdBRIAN BARRETT Use of this site constitutes acceptance of our user agreement (effective 3/21/12) and privacy policy (effective 3/21/12). Affiliate link policyYour California privacy rights. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of Condé Nast.
    CNMN Collection
    ×You are viewing article 1 OF 4 FREE ARTICLES this month.GET UNLIMITED ACCESS.