Why IOS Suddenly So vulnerable: Apple iPhone Not Secure Has You Thought #Part2

19 67
Avatar for Secure
Written by
3 years ago

Could Apple do more to improve the security of its premium-priced Products

As the IOS developed over the years it became more and more complex and difficult to navigate for cybersecurity researchers. Over the past few years, the attacks surface of IOS has significantly expanded fully remote attacks on IOS are starting to be a commonplace. The first major remote privilege escalation attack on IOS made headlines in summer 2016 when a us-based company used three separate vulnerabilities to build spyware to target a political dissident in the United Arab Emirates.

The spyware was completely interactionless, If you received a malicious message through Imessage without opened it you will immediately give adversary access into your iPhone.

The exploit cloud access users messages, calls, email, contacts, calendar and unencrypted data from WhatsApp, Viber, Gmail .facebook, skype and others. The exploit would automatically update its self to stay supported alongside IOS versions and researchers thinks it's still used against iPhone users throughout the world.

MUST-READRemote Exploit: Apple iPhone Not Secure Has You Thought #Part1

Earlier last summer Project-zero was evaluating the remote attack surface of the iPhone and found a total of 10 vulnerabilities most of them in iMessage. iMessage has a very complex source code a lot of which contributes to the apps attack surface carries no benefit to users and the blackhat security conference in las Vegas Researcher Natalie Silvanovich presented several zero-click iMessage exploits some of which were still zero-day at the time. 


It was revealed that iMessage was still vulnerable to full remote interaction take over though malicious just like it was in 2016. Bugs like these are difficult to spot and yet easy to exploit and the blame is on the app complexity with so many features like emoji, file rendering and integration with other apps like Apple pay and Itunes it's easier to make development mistake and introduce vulnerabilities.

MUST-READRemote Exploit: Apple iPhone Not Secure Has You Thought #Part1

Apple's decades-long strategy has been to keep their ecosystem lockdown and close source but when it comes to security Apple is shooting themselves in the foot. There are many researchers that would like to help strengthen the IOS security and some even make a business out of it but because all core components are code source in secret it's hard for security researcher to analyze them.


MUST-READRemote Exploit: Apple iPhone Not Secure Has You Thought #Part1


Initially, Apple managed to keep IOS secure thanks to its lockdown and uniformity over the years that created a digital monoculture if somebody finds an exploit chain for IOS chance are it will work on all iPhone running that version on IOS. Andriod that has traditionally been mostly open-source used to be riddled with bugs in severe security issue but it's vastly increased in recent in years because Open architecture invites more eyes to review and improve the source code.


MUST-READRemote Exploit: Apple iPhone Not Secure Has You Thought #Part1


Andriod while still having a stockpile of its own vulnerabilities mitigates the problem of universal exploits through diversity of ecosystem. Almost every brand of smartphone shapes sampled modified version of Andriod and an exploit working on one phone could be complete unless on the others. The walled garden design is a clever business strategy and it convenient for users but also put all their eggs in one basket.


MUST-READRemote Exploit: Apple iPhone Not Secure Has You Thought #Part1


Apple makes it difficult or impossible to change or delete any of the default apps. Users cannot diversify their devices enough and this uniformity of apple users simplifies the job for the attackers.

All of this manifests itself on the market as well. There are businesses who are brokering exploits on various software and operating systems one of such malware broker "Zerodium" now offers to buy an interaction less zero-day exploit on Andriod for $2.5 million while the equivalent on iPhone cost $2 million.



The supply of iPhone zero-day exploits growing so rapidly that for the first time in history the market is willing to pay more for Andriod exploit than IOS. The broker says they even had to refuse some IOS exploit because the market was so flooded with them.

"Zerodium" also decreased rewards for zone-click exploit on IOS from $1.5 million to $1 million. The primary client of malware brokers is government and state-sponsored adversaries. The FBI  once broke into a terrorist iPhone that Apple refused to build a backdoor for by purchasing a Zero-day exploit from a grey hat hacker. 


It is speculated that the Chinese attacker's cloud has also acquired the IOS exploits from some of these malware brokers but for the longest time Apple has been offering far less for securing their products than the rest of the market.


At the time of the 5 Exploit chains, Apple offered only $200,000 for zero-click full chain kernel exploit when brokers and governments offered to pay several times more. Experts and operating system security are very rare their talent is highly valued. 

MUST-READRemote Exploit: Apple iPhone Not Secure Has You Thought #Part1

The calculus for such a researcher is rather straightforward be ethical and get the minimal reward for your time by reporting exploit to an apple or get paid several million for the same work in somehow rationalized that the people who you sold it to might use it against innocent civilians.


Apple is primarily responsible for securing products they are selling to millions of customers worldwide.


MUST-READRemote Exploit: Apple iPhone Not Secure Has You Thought #Part1

Many of the exploits cloud have been avoided if Apple followed rigorous code reviewing and units testing procedures that would have revealed those bugs to developers before they were abused by malicious adversaries and known afterwards.   

27
$ 0.00
Sponsors of Secure
empty
empty
empty
Avatar for Secure
Written by
3 years ago

Comments

That was so informative....i got know many things about it and of course it is out of mind. Anyway, i have subscribed your account...please subscribe be back

$ 0.00
3 years ago

it is out of mind

$ 0.00
3 years ago

iz svakodnevnog zivota, na srecu susret sa ovnom predvodnikom nije bio oci u oci jer tada bogami ume dobro da zaboli Ne baš iz svakodnevnog života, ovo je Presvlačiimo ih u internacionalni jezik. S kantom na glavi.

$ 0.00
3 years ago

Thanks for the shared knowledge

$ 0.00
3 years ago

Thanks @Tayricky for reading 📖

$ 0.00
3 years ago

I am subscrbe your channel. plz subscrbe me

$ 0.00
3 years ago

Interesting article. Hope you visit my articles if you have time

$ 0.00
3 years ago

Nice and interesting article .Thank you for sharing your knowledge about ios . I also one of the ios user and i dont know some things about it specially when it comes in security .Thank you for the information .I am looking forward and excited for more interesting article you make.God bless us .!

$ 0.00
3 years ago

thanks for reading @evilcrest

$ 0.00
3 years ago

Welcome

$ 0.00
3 years ago

Plz support me I m new here

$ 0.00
3 years ago

Okay enable your sponsorship section

$ 0.00
3 years ago

Good nice well dear

$ 0.00
3 years ago

thanks @zaini348 for reading

$ 0.00
3 years ago