HACKING

Update your iPhone: long-feared spyware hack has become reality

Human rights activist exposed link between malicious iPhone spyware and Israeli cyberespionage firm

PUBLISHED : Friday, 26 August, 2016, 9:18am
UPDATED : Friday, 26 August, 2016, 9:47pm

The much-talked-about hack that would allow governments to spy on your every move through your iPhone and iPad has become reality.

Apple issued a security update for those devices on Thursday after researchers discovered spyware that turns hand-held Apple devices into the mother of all snoops, allowing remote operators to intercept all voice and data communications and pass along every photograph and video.

Researchers said spyware had never been found before this month that could “jailbreak” an iPhone or iPad and seize total control of its functions. Efforts to use the spyware have surfaced in Mexico and the United Arab Emirates, where critics of the government appear to have been targeted for surveillance.

Thursday’s development is a hit on the reputation of Apple products as largely hack-proof, and it raises questions over whether the spyware is in widespread use by authoritarian governments around the world.

Details have also emerged about how the hack was spotted. The suspicious text message that appeared on Ahmed Mansoor’s iPhone promised to reveal details about torture in the United Arab Emirates’ prisons. All Mansoor had to do was click the link.

Mansoor, a human rights activist, didn’t take the bait. Instead, he reported it to Citizen Lab, an internet watchdog, setting off a chain reaction that in two weeks exposed a secretive Israeli cyberespionage firm, defanged a powerful new piece of eavesdropping software and gave millions of iPhone users across the world an extra boost to their digital security.

It is amazing the level they’ve gone through to avoid detection. They have a hair-trigger self-destruct
Mike Murray, Lookout vice-president of research

“It feels really good,” Mansoor said in an interview from his apartment in downtown Ajman, a small city-state in the United Arab Emirates.

Cradling his iPhone to show screenshots of the rogue text, Mansoor said he hoped the developments “could save hundreds of people from being targets”.

Hidden behind the link in the text message was a highly targeted form of spyware crafted to take advantage of three previously undisclosed weaknesses in Apple’s mobile operating system.

Two reports issued on Thursday, one by Lookout, a San Francisco mobile security company, and another by Citizen Lab, based at the University of Toronto’s Munk School of Global Affairs, outlined how the program could completely compromise a device at the tap of a finger. If Mansoor had touched the link, he would have given his hackers free rein to eavesdrop on calls, harvest messages, activate his camera and drain the phone’s trove of personal data.

Apple issued a fix for the vulnerabilities on Thursday, just ahead of the reports’ release, working at a blistering pace for which the Cupertino, California-based company was widely praised.

Arie van Deursen, a professor of software engineering at Delft University of Technology in the Netherlands, said the reports were disturbing. Forensics expert Jonathan Zdziarski described the malicious program targeting Mansoor as a “serious piece of spyware”.

A soft-spoken man who dresses in traditional white robes, Mansoor has repeatedly drawn the ire of authorities in the United Arab Emirates, calling for a free press and democratic freedoms. He is one of the country’s few human rights defenders with an international profile, close links to foreign media and a network of sources. Mansoor’s work has, at various times, cost him his job, his passport and even his liberty.

Online, Mansoor repeatedly found himself in the crosshairs of electronic eavesdropping operations. Even before the first rogue text message pinged across his phone on August 10, Mansoor already had weathered attacks from two separate brands of commercial spyware.

When he shared the suspicious text with Citizen Lab researcher Bill Marczak, they realised he’d been targeted by a third.

Citizen Lab and Lookout both fingered a secretive Israeli firm, NSO Group, as the author of the spyware. Citizen Lab said that past targeting of Mansoor by the United Arab Emirates’ government suggested that it was likely behind the latest hacking attempt as well.

Executives at the company declined to comment, and a visit to NSO’s address in Herzliya showed that the firm had recently vacated its old headquarters – a move recent enough that the building still bore its logo.

In a statement released Thursday which stopped short of acknowledging that the spyware was its own, the NSO Group said its mission was to provide “authorised governments with technology that helps them combat terror and crime”. The company said it couldn’t comment on specific cases.

Apple said to have three new iPhones planned for 2017

Marczak said he and fellow researcher John Scott-Railton turned to Lookout for help to pick apart the malicious program, a process which Mike Murray, Lookout’s vice-president of research, compared to “defusing a bomb.”

“It is amazing the level they’ve gone through to avoid detection,” Murray said of the software’s makers. “They have a hair-trigger self-destruct.”

Working over a two-week period, the researchers found that Mansoor had been targeted by an unusually sophisticated piece of software which some have valued at US$1 million. He said he was amused by the idea that so much money was being poured into watching him.

“If you would give me probably 10 per cent of that I would write the report about myself for you,” he joked.

The apparent discovery of Israeli-made spyware being used to target a dissident in the United Arab Emirates raises awkward questions for both countries. The use of Israeli technology to police its own citizens is an uncomfortable strategy for an Arab country with no formal diplomatic ties to the Jewish state. And Israeli complicity in a cyberattack on an Arab dissident would seem to run counter to the country’s self-description as a bastion of democracy in the Middle East.

NSA spyware buried deep in hard drives by top manufacturers

There are awkward questions, too, for Francisco Partners, the private equity firm which owns the NSO Group. Francisco is only an hour’s drive from the headquarters of Apple, whose products the cybersecurity firm is accused of hacking.

Messages left with Francisco partners’ offices in London and San Francisco went unreturned. Israeli and Emirati authorities did not return calls seeking comment.

Attorney Eitay Mack, who advocates for more transparency in Israeli arms exports, said his country’s sales of surveillance software are not closely policed. He also noted that Israeli Prime Minister Benjamin Netanyahu has cultivated warmer ties with Arab Gulf states.

“Israel is looking for allies,” Mack said. “And when Israel finds allies, it does not ask too many questions.”