Update Your iPhone To Avoid Latest iMessage Security Vulnerability

If you own an iPhone, be aware that a new iMessage vulnerability has been recently found and patched by Apple. This was part of the iOS 12.4 update.

The flaw allowed hackers to access and read the contents of files stored on iOS devices remotely. They could access files the same way as the device owner with no sandbox, and with no user interaction needed.

The issue was discovered by Natalie Silvanovich, who is a security research with Google’s Project Zero.  As a proof of concept, she created a demo that only works on devices running iOS 12 or later. She describes it as “a simple example to demonstrate the reach-ability of the class in Springboard. The actual consequences of the bug are likely more serious.”

In describing the issue itself, Silvanovich had this to say:

“First, it could potentially allow undesired access to local files if the code deserializing the buffer ever shares it (this is more likely to cause problems in components that use serialized objects to communicate locally than in iMessage).  Second, it allows an NSData object to be created with a length that is different than the length of its byte array.  This violates a very basic property that should always be true of NSData objects.  This can allow out of bounds reads, and could also potentially lead to out-of-bounds writes, as it is now possible to create NSData objects with very large sizes that would not be possible if the buffer was backed.”

As mentioned, this bug has already been patched, along with two other iMessage vulnerabilities that Silvanovich recently discovered. All of them were addressed in Apple’s most recent (12.4) update. If you’re not in the habit of installing security updates automatically, then you’ll need to grab this one and install it manually at your earliest convenience.

Ransomware Now Sends Malicious Texts Through Mobile Device

If you own an Android device, there’s a new threat to be at least moderately concerned about.  It takes the form of a new ransomware family that spreads from one victim to the next with text messages that contain poisoned links to every contact on an infected device.

The ESET research team that found the software had this to say about it:

“Due to narrow targeting and flaws in both execution of the campaign and implementation of its encryption, the impact of this new ransomware is limited.

If your system is infected, the first thing it will do is raid your contacts list and send SMS text messages to everyone on it.  Anybody who clicks on the link in the SMS message will also be infected.

After sending a flurry of messages, the malware will turn its attention to your device itself. It will then set about the task of encrypting most of the files on your device.  Fortunately, the people behind this new threat prove themselves to be new to the game.”

ESET continues:

“After the ransomware sends out this batch of malicious SMSes, it encrypts most user files on the device and requests a ransom.  Due to flawed encryption, it is possible to decrypt the affected files without any assistance from the attacker.”

All in all, this issue is only of minor concern.  It’s annoying, and certainly time consuming to restore your files. However, it’s not an especially dangerous malware strain – yet, and that’s the problem.

Whomever is behind this new threat certainly has the right idea, even if they lack the technical chops to pull it off.  Skills, however, can be learned and honed.  As a first try, this effort is disturbing because it’s clever.  The moment the people who wrote the code get the technical skills to pair with that cleverness, they’re going to be genuinely dangerous.

Update iPhone to Avoid Possible iMessage Bug

People like and tend to gravitate to Apple products because the company has gone to great lengths to make their products are highly secure.

Sure, you pay more for them, but most people justify the added expense because a) they look better and are better designed than competing products and b) they’ve got a reputation for being more secure.

Unfortunately, even the most secure technology isn’t immune to hacking and other problems.  In the not so distant past, we’ve seen reports of clever hackers finding ways of bricking Apple smartphones and causing other types of mayhem.  One of the more recent iterations of this involved a bug in Apple’s iMessage system. The bug allowed hackers to send a carefully crafted message that made heavy use of special characters that could turn an expensive iPhone into a paperweight.

Sadly, a similar problem has recently surfaced, and once again, it centers around the iMessage service.  The issue was discovered by Natalie Silvanovich, a Google Project Zero researcher, who had this to say about her discovery:

“On a Mac, this (specially crafted message) causes soagent to crash and respawn, but on an iPhone, this code is in Springboard.  Receiving this message will cause Springboard to crash and respawn repeatedly, causing the UI not to be displayed and the phone to stop responding to input.”

If you receive a message like this, the only way to get your phone back is to do a factory reset, which of course, results in all data on your phone being wiped (unless you’ve made a backup).

The good news is that Apple has already issued a fix for this issue, in iOS 12.3, released on May 13 of this year.  If you aren’t regularly in the habit of downloading the latest updates, you’ll want to make an exception in this case.

New Spyware Is Targeting WhatsApp Messages

Recently, Kaspersky Labs has identified a new strain of malware to be concerned about, and it is spreading across the internet.

Called FinSpy, it specifically targets WhatsApp on both Android and iOS devices.  An analysis of the code reveals that the spyware was created by a German company called Gamma Group, and that it is primarily used by state actors.

In other words, it’s a serious piece of code, as is anything that’s predominately used by governmental agencies. If this malware winds up on your device, it can collect a wide range of information and send it back to the owners of the code.

This information includes:

  • SMS/MMS
  • Emails (including encrypted emails)
  • GPS location data
  • Photos
  • Files in memory
  • Phone call records
  • Messaging application data from Whatsapp, Telegram, Signa, Messenger, Viber, Threema and BBM

If there’s a silver lining to be found about FinSpy, it is the fact that in most cases, a hacker would need to gain physical access to your phone in order to install the malicious code.  The exception here is if you’re using a rooted smartphone or a jailbroken iPhone.  In those cases, all the hacker needs to do to install FinSpy on your device is send you an email or simple push notification.

At present, there’s no good way to prevent it, and no easy way to detect the malware if it finds its way onto your system.  Kaspersky Lab recommends avoiding opening suspicious links received via email or SMS and to protect your phone with a strong password.  Additionally, the company stresses the importance of regularly installing security updates. This is because FinSpy benefits from security flaws found in older versions of both Android and iOS operating systems.

So far, the company reports that there have only been about a dozen confirmed FinSpy installations worldwide. That’s good news indeed, but this is still a serious threat.

Large Percentage Of Mobile Apps Have Security Flaws

How many apps do you have on your phone?If you’re like most people, you’ve likely got dozens or more. Considering how much storage is available on mobile devices these days, people tend to install apps and when they no longer want them, they don’t bother to uninstall them. Whatever your number is, the statistics recently published by Positive Technologies in their report “Vulnerabilities and Threats in Mobile Applications 2019” will alarm you.

Here are a few of the key findings:

  • 35 percent of all mobile apps tested had vulnerabilities relating to the insecure transmission of sensitive data.
  • 35 percent had issues with the incorrect implementation of session expiration
  • 20 percent had problems relating to sensitive data being stored in the app source code and insufficient protection against cyber attacks using brute-force techniques
  • 29 percent of tested apps contained vulnerabilities relating to insecure inter-process communications, which are classed as high risk

Overall, high-risk vulnerabilities were found in 38 percent of tested iOS apps, and 43 percent of Android apps.  Even worse, 89 percent of the vulnerabilities that were discovered could be exploited via malware.  The hacker targeting the device would never even need to take physical control of the device.

Leigh-Anne Galloway (one of the people responsible for the report) said:

“Developers pay painstaking attention to software design in order to give us a smooth and convenient experience and people gladly install mobile apps and provide personal information.  However, an alarming number of apps are critically insecure, and far less developer attention is spent on solving that issue. We recommend that users take a close look when applications request access to phone functions or data.  If you doubt that an application needs access to perform its job correctly, decline the request.”

Wise words, and very good advice.  So back to the initial question, and with the statistics above in mind, how many apps do you have on your phone?