Application Security , Endpoint Security , Fraud Management & Cybercrime

Apple Patched iMessage. But Can It Be Made Safer Overall?

Citizen Lab Says iMessage Exploit Delivered NSO's Pegasus Spyware
Apple Patched iMessage. But Can It Be Made Safer Overall?
Photo: Flickr/CC

Apple on Monday issued an emergency patch for a software vulnerability that researchers say was used to deliver spyware via iMessage to the mobile phones of activists.

See Also: The Essential Guide to Container Monitoring

It's an exploit-and-patch pattern that has repeated itself with vulnerable people often in the crosshairs. While software flaws can't be completely eliminated from iMessage and iOS, a few changes to iMessage could make it safer overall for high-risk individuals, according to Patrick Wardle, an Apple security expert.

The vulnerability, CVE-2021-30860, was used in an exploit that could infect devices with powerful spyware called Pegasus, made by the Israeli company NSO Group, according to researchers at The Citizen Lab, a group within the University of Toronto. The Citizen Lab reported the flaw to Apple less than a week ago and published its own findings on Monday.

The flaw affects iOS before version 14.8, macOS versions before Big Sur 11.6 and Catalina before Security Update 2021-005 and watchOS before version 7.6.2. The patch fixes an integer overflow vulnerability in Apple's image rendering library, which is called CoreGraphics.

The exploit is particularly potent because it requires no interaction from a victim who is targeted. These are sometimes referred to as "zero-click" exploits and are among the most valuable and powerful ways to compromise a device.

The Citizen Lab dubbed the exploit Forcedentry. Forcedentry is believed to have been used since at least February to deliver Pegasus. The Citizen Lab says it found indications that Forcedentry had been used against a Saudi activist and activists in Bahrain after examining their devices. Forensic clues indicate that it was likely developed by the NSO Group.

Messaging applications such iMessage have large attack surfaces because the applications accommodate a huge range of file formats, which could result in buggy behaviors, says Wardle, who created the Objective-See suite of Mac security tools and formerly worked at the U.S. National Security Agency.

Using those vulnerabilities in iMessage to target people's devices is "kind of just like shooting fish in the barrel," Wardle says.

Free .GIFs? No Thanks

NSO Group has been repeatedly accused of selling its Pegasus spyware to governments that then turn it on vulnerable people.

Citizen Lab has documented that Pegasus has been used against activists, dissidents or even, as in Mexico, for targeting supporters of a tax on soda. Efforts to contact NSO Group were unsuccessful, but it has maintained that it vets the sale of the software and that abuse has been rare.

The clues that led to the latest vulnerability were files labeled as .GIFs, tweets John Scott-Railton, a senior researcher at The Citizen Lab. The files were intentionally mislabeled, however, and were actually Adobe PSD files, a format used with its Photoshop application, and PDF files. Sent via iMessage, those files in combination exploited the CoreGraphics library, which eventually resulted in the installation of Pegasus.

Files mislabeled as .GIFs were part of an exploit that delivered spyware to a Saudi activist's iPhone. (Source: Citizen Lab)

"[The victim's] device becomes a spy in their pocket," Scott-Railton tweets.

The Citizen Lab and other researchers have documented in the past how vulnerabilities in Apple's iMessage and other software has led to installation of NSO's spyware.

In December 2020, The Citizen Lab documented a zero-click vulnerability in iMessage called Kismet, which could hack Apple's latest iPhone 11 running iOS 13.5.1.

In July, Amnesty International and a Paris-based journalist collective called Forbidden Stories released a report covering their investigation into the targeting of activists and journalists with Pegasus. The organizations concluded that iMessage was likely vulnerable at that time to a zero-click exploit (see: Spyware Exposé Highlights Suspected Apple Zero-Day Flaws).

Securing iMessage

For vulnerable people, there's one option to nix exploits delivered through iMessage: Turn it off and deregister an iMessage account. But that's a terrible trade-off between usability and security since there's no usability.

Switching to another messaging platform doesn’t necessarily increase safety, either. In 2019, NSO Group's Pegasus spyware was forcibly installed on devices using CVE-2019-3568, a vulnerability in WhatsApp. And other messengers such as Signal share similar risks, as this remote code execution vulnerability in Signal's desktop version in 2018 shows.

Even if security research can't shake out all the vulnerabilities in iMessage or iOS, there are ways Apple could reduce the application's attack surface, Wardle says.

Patrick Wardle

Anyone can send anyone else an iMessage. That means knowledge of the victim's phone number is enough to fire an exploit.

"[iMessage] is such a great distribution mechanism. [Apple] will route your exploit anywhere in the world to the target for you using end-to-end encryption. As an attacker, what more could you ask for?" Wardle says.

He says that's a much better scenario for an attacker than, say, email - in which a malicious message may be scanned by an ISP or security software. The end-to-end encryption in iMessage prevents visibility on malicious content. Often the only way to uncover exploits is by doing what The Citizen Lab has done - tediously following obscure forensic clues on victims' phones.

Apple does allow iMessage users to filter unsolicited iMessages from people not in someone's contacts. But it appears those messages still reach the device, and it's unclear if filtering those senders actually blocks attack code from executing. Turning that feature on, however, will put messages with potentially dangerous links in another bucket, perhaps making it less likely victims will click on a link.

Filtering messages from unknown senders is a feature in iOS. (Source: Apple)

Wardle says Apple could introduce a feature in iMessage that turns off compatibility for all file formats and only allow text - no opening PDFs or dodgy Photoshop content, he says. Those kinds of security customizations have long been around for browsers, for example, like turning off JavaScript or disabling Adobe's bug-riddled Flash Player.

"There are a lot of third-party plug-ins, plug-ins and extensions that really allow you to still use the browser, but really reduce the attack surface, which is great," Wardle says. "That makes some very large percentage of exploits just not even applicable anymore."

Messaging platforms are always adding new features to attract new users. But ironically, maybe adding the ability to shut off features would benefit users at high risk of surveillance the most.


About the Author

Jeremy Kirk

Jeremy Kirk

Managing Editor, Security and Technology, ISMG

Kirk is a veteran journalist who has reported from more than a dozen countries. Based in Sydney, he is Managing Editor for Security and Technology for Information Security Media Group. Prior to ISMG, he worked from London and Sydney covering computer security and privacy for International Data Group. Further back, he covered military affairs from Seoul, South Korea, and general assignment news for his hometown paper in Illinois.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.