Hackers breached iPhones for years, Google says
Hackers planted spyware on iPhone users’ devices over a two-year period by exploiting a vulnerability in the technology’s operating systems, Google said Friday.
The bad actors targeted a group of infected websites that, when visited by iPhone users, attacked the devices and in some cases installed malware, according to Ian Beer of Project Zero, a team of Google security analysts that investigates cybercrime.
“There was no target discrimination; simply visiting the hacked site was enough for the exploit server to attack your device, and if it was successful, install a monitoring implant. We estimate that these sites receive thousands of visitors per week,” Beer wrote in a blog post.
Using the implant, hackers could access Apple customers’ data, including their passwords and personal contacts, as well as messages sent through iMessage, WhatsApp, Gmail and Google Hangouts, according to Project Zero researchers.
Almost every version of Apple’s iPhone operating system — from iOS 10 through to the latest version of iOS 12 — was vulnerable, he said. Still, it’s unclear how many users might have been affected.
Old bug, new hack
The security bugs Beer identified aren’t new, but rather were exploited in novel ways.
“Ian shows this is the first time these types of vulnerabilities have been used out on the wide internet, where if the malicious code was present on a certain website that was accessed, the unsuspecting user would be infected, and remain blissfully ignorant of it,” said operating system internals researcher Jonathan Levin.
In this case, no user intervention, such as a prompt to click on a link, was required for an iPhone to get inflected.
The scope of the hack suggests it was backed by a nation rather than an individual, Levin said. “It requires a lot of research, and there has to be an endgame motive for this,” he told CBS MoneyWatch. “It’s possible that those behind the hack targeted a specific demographic or interest groups.”
“My personal hunch, because of the level of proficiency and efficacy of the exploits, is that this is not the work of your average hacker,” he added.
Neither is there a sure-fire way for users to protect themselves against security breaches, Beer said. “All that users can do is be conscious of the fact that mass exploitation still exists and behave accordingly; treating their mobile devices as both integral to their modern lives, yet also as devices which when compromised, can upload their every action into a database to potentially be used against them.”
Google said it reported its findings to Apple in February, after which the tech giant released an updated operating system to fix the flaws.
Android’s no safer
While Beer highlights some of the iPhone’s vulnerabilities, the attack shouldn’t be misread to suggest that Google’s Android operating system is safer, Levin said.
“The takeaway shouldn’t be, ‘I’m going to use Android from now on because it’s more secure.’ That’s far from it,” he said. “Similar and/or possibly worse bugs exist in Android and other operating systems as well. Google Project Zero simply chose to highlight iOS this time.”
Apple claims to be the most secure operating system, and for good reason. “Apple genuinely invests extreme efforts in securing iOS on multiple layers, down to their proprietary hardware, and in some aspects are still way ahead of Android,” Levin said.