Click to Skip Ad
Closing in...
  1. Best Alexa Devices
    08:06 Deals

    Amazon’s hottest smart home gadget is down to $19 today – and you can get a $4…

  2. Mattress Topper Amazon
    14:52 Deals

    35,000 Amazon shoppers gave this mattress topper 5 stars – get one for $34 today

  3. Amazon Echo Auto Price
    13:16 Deals

    Add hands-free Alexa to your car for $19.99 with this Amazon deal

  4. Best Selling Drones Amazon
    13:27 Deals

    Amazon has a $59 drone you can control with gestures or just your voice

  5. Amazon Gift Card Promotion
    11:46 Deals

    How you can get $15 from Amazon right now for free




Hackers used multiple zero-day exploits to target iPhone, Android, and Windows users

March 19th, 2021 at 6:15 PM
iPhone Security

Even though the security mechanisms implemented by Apple to protect iOS and keep hundreds of millions of devices secure have improved by leaps and bounds, hackers are still finding ways to skirt around Apple’s protective measures. By its very nature, mobile security is something of a game of cat-and-mouse, and Apple, more often than not, typically finds itself reacting to newly unearthed exploits put together by increasingly sophisticated hackers.

Recently, researchers from Google’s Project Zero — a team whose sole mission is to identify zero-day vulnerabilities — revealed that hackers in 2020 were taking advantage of seven 0-day exploits to compromise Android, Windows, and iOS devices. The exploits were delivered via a watering hole attack whereby the malicious code was inserted into dozens of websites likely to be visited by specific targets or groups of people.

Today's Top Deal Behold: Amazon's best AirPods Pro deal of 2021! List Price:$249.00 Price:$189.99 You Save:$59.01 (24%) Buy Now Available from Amazon, BGR may receive a commission Available from Amazon BGR may receive a commission

Some of the code and strategies implemented by the hackers responsible left Google’s security team impressed:

All of the platforms employed obfuscation and anti-analysis checks, but each platform’s obfuscation was different. For example, iOS is the only platform whose exploits were encrypted with ephemeral keys, meaning that the exploits couldn’t be recovered from the packet dump alone, instead requiring an active MITM on our side to rewrite the exploit on-the-fly.

The vulnerabilities cover a fairly broad spectrum of issues – from a modern JIT vulnerability to a large cache of font bugs. Overall each of the exploits themselves showed an expert understanding of exploit development and the vulnerability being exploited. In the case of the Chrome Freetype 0-day, the exploitation method was novel to Project Zero. The process to figure out how to trigger the iOS kernel privilege vulnerability would have been non-trivial. The obfuscation methods were varied and time-consuming to figure out.

Notably, the most recent discovery of 0-days is believed to come from the same group of hackers responsible for similar attacks unearthed back in February of 2020. Even then, Project Zero researchers were taken aback by the level of sophistication employed by the hackers.

“These exploit chains are designed for efficiency & flexibility through their modularity,” the Project Zero team said via a blog post back in January. “They are well-engineered, complex code with a variety of novel exploitation methods, mature logging, sophisticated and calculated post-exploitation techniques, and high volumes of anti-analysis and targeting checks. We believe that teams of experts have designed and developed these exploit chains.”

While it remains unclear what websites were targeted and what the hackers were seeking to accomplish, watering hole attacks in the past have been used to target iPhones belonging to Uyghur Muslims in China. In one highly-publicized attack, which was brought to light by Project Zero back in 2019, hackers used a number of 0-day exploits to target websites frequented by Uyghur Muslims so that it could snoop on user photos, private messages, passwords, and even GPS location data.

The 2019 attack was believed to be the work of the Chinese government and given the level of sophistication of the 2020 attacks, it stands to reason that it was state-sponsored as well. But again, there’s not enough information at this point to speculate as to which country might be behind the current attacks.

Today's Top Deal Amazon's #1 best-selling portable Bluetooth speaker is down to the lowest price of 2021! List Price:$34.99 Price:$22.09 You Save:$12.90 (37%) Buy Now Available from Amazon, BGR may receive a commission Available from Amazon BGR may receive a commission

A life long Mac user and Apple enthusiast, Yoni Heisler has been writing about Apple and the tech industry at large for over 6 years. His writing has appeared in Edible Apple, Network World, MacLife, Macworld UK, and most recently, TUAW. When not writing about and analyzing the latest happenings with Apple, Yoni enjoys catching Improv shows in Chicago, playing soccer, and cultivating new TV show addictions, the most recent examples being The Walking Dead and Broad City.




Popular News