为期 4 年的活动利用高级漏洞为 iPhone 添加后门
4-year campaign backdoored iPhones using advanced exploit

原始链接: https://arstechnica.com/security/2023/12/exploit-used-in-mass-iphone-infection-campaign-targeted-secret-hardware-feature/

2023 年 12 月,卡巴斯基实验室网络安全专家 Tero Vesalainen 详细介绍了一项名为“三角测量”的操作,该操作涉及复杂的 iPhone 恶意软件,在四年内影响了数万名苹果用户。 据信,该活动起源于俄罗斯,针对驻扎在那里的外交官和记者,导致大量被盗的机密信息通过恶意应用程序和木马程序发送,这些程序和木马程序伪装成无害的日历事件和群聊。 虽然受害者的确切人数仍不确定,但研究人员估计有一万到三万人成为该计划的受害者。 独特的是,该感染不需要用户采取任何故意操作,而是通过包含损​​坏图像文件的 iMessage 进行传播,这些图像文件触发了 Apple 核心操作系统软件中以前未知的关键漏洞。 其中一个弱点是由一个据称具有非凡技能的未知实体发现的,它利用了未公开的硬件功能,为攻击者提供了一种逃避苹果系统完整性保护机制的手段,使他们能够完全控制受损的系统。 尽管苹果随后解决了这个问题,但包括 MacBook、Apple TV 和 iPad 在内的一些易受攻击的组件至今仍在使用。 研究人员表示,目前还无法确定美国国家安全局、另一个外国势力,或者联邦安全局(FSB)是否在这起事件中发挥了作用。 然而,由于攻击的性质和范围,再加上有证据表明俄罗斯可能是对此负责的国家,合理的假设可能是美国国家安全局或俄罗斯联邦安全局实施了最初的软件缺陷。 无论如何,正在进行的调查将持续一段时间。

(大多数)评论移至: 三角测量行动:最后的(硬件)谜团 - https://news.ycombinator.com/item?id=38783112 - 2023 年 12 月(71 条评论) 感谢 Ars Technica 的 Dan Goodin 撰写的这篇文章。 这篇文章以“渐进披露”的方式阅读,即使我不是程序员,我也能坚持到底。 丹太棒了。 过去接受过他的采访,他对理解技术细微差别以及向非专业观众准确传达故事的兴趣给他留下了深刻的印象。 他绝对不像我在科技新闻界遇到的很多人那样是一个追逐头条新闻的人。 Ars很幸运能拥有他。 I would like also to link an article with technical details of main exploit (memory protection bypass by using undocumented hadware GPU registers): https://securelist.com/operation-triangulation-the-last-hard... 有一系列关于三角测量操作的文章...... https://securelist.com/trng-2023/
相关文章

原文
iphone with text background

Researchers on Wednesday presented intriguing new findings surrounding an attack that over four years backdoored dozens if not thousands of iPhones, many of which belonged to employees of Moscow-based security firm Kaspersky. Chief among the discoveries: the unknown attackers were able to achieve an unprecedented level of access by exploiting a vulnerability in an undocumented hardware feature that few if anyone outside of Apple and chip suppliers such as ARM Holdings knew of.

“The exploit's sophistication and the feature's obscurity suggest the attackers had advanced technical capabilities,” Kaspersky researcher Boris Larin wrote in an email. “Our analysis hasn't revealed how they became aware of this feature, but we're exploring all possibilities, including accidental disclosure in past firmware or source code releases. They may also have stumbled upon it through hardware reverse engineering.”

Four zero-days exploited for years

Other questions remain unanswered, wrote Larin, even after about 12 months of intensive investigation. Besides how the attackers learned of the hardware feature, the researchers still don’t know what, precisely, its purpose is. Also unknown is if the feature is a native part of the iPhone or enabled by a third-party hardware component such as ARM’s CoreSight

The mass backdooring campaign, which according to Russian officials also infected the iPhones of thousands of people working inside diplomatic missions and embassies in Russia, according to Russian government officials, came to light in June. Over a span of at least four years, Kaspersky said, the infections were delivered in iMessage texts that installed malware through a complex exploit chain without requiring the receiver to take any action.

With that, the devices were infected with full-featured spyware that, among other things, transmitted microphone recordings, photos, geolocation, and other sensitive data to attacker-controlled servers. Although infections didn’t survive a reboot, the unknown attackers kept their campaign alive simply by sending devices a new malicious iMessage text shortly after devices were restarted.

A fresh infusion of details disclosed Wednesday said that “Triangulation”—the name Kaspersky gave to both the malware and the campaign that installed it—exploited four critical zero-day vulnerabilities, meaning serious programming flaws that were known to the attackers before they were known to Apple. The company has since patched all four of the vulnerabilities, which are tracked as:

Besides affecting iPhones, these critical zero-days and the secret hardware function resided in Macs, iPods, iPads, Apple TVs, and Apple Watches. What’s more, the exploits Kaspersky recovered were intentionally developed to work on those devices as well. Apple has patched those platforms as well. Apple declined to comment for this article.

Detecting infections is extremely challenging, even for people with advanced forensic expertise. For those who want to try, a list of Internet addresses, files, and other indicators of compromise is here.

Mystery iPhone function proves pivotal to Triangulation’s success

The most intriguing new detail is the targeting of the heretofore-unknown hardware feature, which proved to be pivotal to the Operation Triangulation campaign. A zero-day in the feature allowed the attackers to bypass advanced hardware-based memory protections designed to safeguard device system integrity even after an attacker gained the ability to tamper with memory of the underlying kernel. On most other platforms, once attackers successfully exploit a kernel vulnerability they have full control of the compromised system.

On Apple devices equipped with these protections, such attackers are still unable to perform key post-exploitation techniques such as injecting malicious code into other processes, or modifying kernel code or sensitive kernel data. This powerful protection was bypassed by exploiting a vulnerability in the secret function. The protection, which has rarely been defeated in exploits found to date, is also present in Apple’s M1 and M2 CPUs.

Kaspersky researchers learned of the secret hardware function only after months of extensive reverse engineering of devices that had been infected with Triangulation. In the course, the researchers' attention was drawn to what are known as hardware registers, which provide memory addresses for CPUs to interact with peripheral components such as USBs, memory controllers, and GPUs. MMIOs, short for Memory-mapped Input/Outputs, allow the CPU to write to the specific hardware register of a specific peripheral device.

The researchers found that several of MMIO addresses the attackers used to bypass the memory protections weren’t identified in any so-called device tree, a machine-readable description of a particular set of hardware that can be helpful to reverse engineers. Even after the researchers further scoured source codes, kernel images, and firmware, they were still unable to find any mention of the MMIO addresses.

联系我们 contact @ memedata.com