Skip to main content

Google Spots A New Spyware On Android And iOS: Should You Be Worried

Google’s Project Zero and Threat Analysis Group (TAG) has come forward with its findings on the activities of an Italian spyware maker named RCS Labs. This is not as big in scale or scope as Israeli NSO Group and its proprietary Pegasus spyware. Nonetheless, it has reportedly been around for quite a few years and has been used on people in Italy, Kazakhstan, and Syria. Even if your country's name isn’t on the list, know that TAG is currently tracking more than 30 spyware vendors that have grown into a full-blown ecosystem and lends their services to world governments. So, let’s understand how these things work.

How Do RCS Labs’ Android And iOS Spyware Work?

Fake My Vodafone App

The spyware will be masked as a fake My Vodafone app that is pushed to the users through an SMS link and they are tricked into installing the app. Well, to convince them, the attackers have sometimes got the ISPs to disconnect the mobile data first and then ask them to install the particular My Vodafone app to restore the services.

The app would seem legit and the sideloading works because it was signed in through Apple's Enterprise Developer Program. Apple has however revoked all certificates and accounts related to this now.

Talking about sideloading, Apple said, “Enterprise certificates are meant only for internal use by a company, and are not intended for general app distribution, as they can be used to circumvent App Store and iOS protections. Despite the program’s tight controls and limited scale, bad actors have found unauthorized ways of accessing it, for instance by purchasing enterprise certificates on the black market.”

Apple has also patched the exploits that were used by the bad actors to sneak into the victim’s iPhones. 

According to Project Zero member Ian Beer, the exploits were successful in the first place, because of the new  “system-on-a-chip” and “coprocessors” used in the recent iPhones, something which is used by Android phones too.

iOS security

Meanwhile, TAG member Benoit Sevens remarked, “The commercial surveillance industry benefits from and reuses research from the jailbreaking community. In this case, three out of six of the exploits are from public jailbreak exploits. We also see other surveillance vendors reusing techniques and infection vectors initially used and discovered by cyber crime groups. And like other attackers, surveillance vendors are not only using sophisticated exploits but are using social engineering attacks to lure their victims in.”

Another TAG employee Clement Lecigne told WIRED that “These vendors are enabling the proliferation of dangerous hacking tools, arming governments that would not be able to develop these capabilities in-house. But there is little or no transparency into this industry, that's why it's critical to share information about these vendors and their capabilities.”

We agree and appreciate Google and other parties involved in discovering such vulnerabilities. Now if you own an iPhone or for that matter any computing device, you are advised to keep their software up to date.

As for other news, reviews, feature stories, buying guides, and everything else tech-related, keep reading Digit.in.



from Security Software News https://ift.tt/i0eofbX

Comments

Popular posts from this blog

Apple Seeds iOS 18.5 Developer Beta 3 Update for iPhone; Public Beta 2 Also Released

Apple on Monday rolled out the iOS 18.5 Developer Beta 3 update to developers and beta testers. It arrives as a minor update for the iPhone with similar features in tow. Alongside, it bundles fixes for a bug that caused black screen to appear on the new Apple Vision Pro. Apple also seeded the iOS 18.5 Public Beta 2 update with a handful of changes compared to the publ... from Gadgets 360 https://ift.tt/ZGYOJvf

What if a botched Google search card says you are a serial killer

Many of us have come to heavily rely on Google Search and often don’t question the veracity of information Google cherry-picks from the vast data available on the world wide web for its search cards. This incident, which is one part funny and two parts scary, makes it clear that Google’s Knowlege Graph may not be as sacrosanct as you may have believed.  Hristo Georgiev was informed by a former colleague that a Google search of his name returned a Google Knowlege Graph that depicted his photo and linked it to a Bulgarian rapist and serial killer of the same name, also known as ‘The Sadist’, who murdered five people back in the 1970s and was later executed by shooting.  The graph linked the info to a Wikipedia article, which incidentally had no link to any of Georgiev’s profile or his image. It was Google’s algorithms that erroneously matched the two. What’s even more problematic is that Hristo Georgiev is not a unique name and is shared by hundreds of other people.  As...