{"id":39201,"date":"2023-04-27T15:37:53","date_gmt":"2023-04-27T19:37:53","guid":{"rendered":"https:\/\/mjtsai.com\/blog\/?p=39201"},"modified":"2024-09-16T20:45:55","modified_gmt":"2024-09-17T00:45:55","slug":"zero-click-exploits-against-ios-16","status":"publish","type":"post","link":"https:\/\/mjtsai.com\/blog\/2023\/04\/27\/zero-click-exploits-against-ios-16\/","title":{"rendered":"Zero-Click Exploits Against iOS 16"},"content":{"rendered":"<p><a href=\"https:\/\/citizenlab.ca\/2023\/04\/nso-groups-pegasus-spyware-returns-in-2022\/\">Citizen Lab<\/a> (<a href=\"https:\/\/news.ycombinator.com\/item?id=35617951\">Hacker News<\/a>):<\/p>\n<blockquote cite=\"https:\/\/citizenlab.ca\/2023\/04\/nso-groups-pegasus-spyware-returns-in-2022\/\">\n<p>Our ensuing investigation led us to conclude that, in 2022, NSO Group customers widely deployed at least three iOS 15 and iOS 16 zero-click exploit chains against civil society targets around the world.<\/p>\n<p>NSO Group&rsquo;s third and final known 2022 iOS zero-click, which we call &ldquo;<b><i>PWNYOURHOME<\/i><\/b><i>,<\/i>&rdquo; was deployed against iOS 15 and iOS 16 starting in October 2022. It appears to be a novel <i>two-step<\/i> zero-click exploit, with each step targeting a <i>different<\/i> process on the iPhone. The first step targets <i>HomeKit<\/i>, and the second step targets iMessage.<\/p>\n<p>[&#8230;]<\/p>\n<p>Logs from another <b><i>PWNYOURHOME<\/i><\/b>-exploited device from the 2022 global target pool examined in the course of this investigation showed the <i>homed<\/i> process decoding what appears to be an unusual <i>NSKeyedUnArchiver<\/i> when it crashed.<\/p>\n<\/blockquote>\n<p>It sounds like Apple was not using <code>NSSecureCoding<\/code>.<\/p>\n<blockquote cite=\"https:\/\/citizenlab.ca\/2023\/04\/nso-groups-pegasus-spyware-returns-in-2022\/\"><p>Logs from yet another <b><i>PWNYOURHOME<\/i><\/b>-exploited device from the 2022 target pool show that, following the <i>homed<\/i> phase of <b><i>PWNYOURHOME<\/i><\/b>, the phone downloaded PNG images from iMessage. Processing these images caused crashes in the <i>MessagesBlastDoorService<\/i> process. These crashes give us glimpses of what the exploit was doing at various stages, and suggest that the exploit may have circumvented <a href=\"https:\/\/developer.apple.com\/documentation\/security\/preparing_your_app_to_work_with_pointer_authentication\">pointer authentication codes<\/a> (PAC) in some cases by repurposing PAC-valid pointers already present in memory, such as signed pointers to callback functions present in constant structs.<\/p><\/blockquote>\n\n<p><a href=\"https:\/\/www.schneier.com\/blog\/archives\/2023\/04\/new-zero-click-exploits-against-ios.html\">Bruce Schneier<\/a>:<\/p>\n<blockquote cite=\"https:\/\/www.schneier.com\/blog\/archives\/2023\/04\/new-zero-click-exploits-against-ios.html\">\n<p>One interesting bit is that Apple&rsquo;s Lockdown Mode (part of iOS 16) seems to have worked to prevent infection.<\/p>\n<\/blockquote>\n\n<p><a href=\"https:\/\/shadowfile.inode.link\/blog\/2022\/07\/revisiting-pegasus-on-ios9\/\">Zach Cutlip<\/a>:<\/p>\n<blockquote cite=\"https:\/\/shadowfile.inode.link\/blog\/2022\/07\/revisiting-pegasus-on-ios9\/\">\n<p>What follows is a writeup of the kernel bugs NSO Group&rsquo;s Pegasus spyware exploited in iOS 9, specifically versions 9.3.4 and earlier. The spyware was discovered and the vulnerabilities patched roughly six years ago.<\/p>\n<\/blockquote>\n\n<p>Previously:<\/p>\n<ul>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2023\/04\/20\/lockdown-mode-in-ios-16-4-breaks-web-forms\/\">Lockdown Mode in iOS 16.4 Breaks Web Forms<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2022\/07\/06\/lockdown-mode\/\">Lockdown Mode<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2021\/11\/24\/apple-sues-nso-group\/\">Apple Sues NSO Group<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2021\/09\/13\/zero-click-imessage-attacks\/\">Zero-click iMessage Attacks<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2021\/07\/23\/through-the-blast-door\/\">Through the Blast Door<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2021\/08\/04\/scanning-your-iphone-for-pegasus\/\">Scanning Your iPhone for Pegasus<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2021\/02\/01\/imessages-blastdoor-sandbox\/\">iMessage&rsquo;s BlastDoor Sandbox<\/a><\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>Citizen Lab (Hacker News): Our ensuing investigation led us to conclude that, in 2022, NSO Group customers widely deployed at least three iOS 15 and iOS 16 zero-click exploit chains against civil society targets around the world. NSO Group&rsquo;s third and final known 2022 iOS zero-click, which we call &ldquo;PWNYOURHOME,&rdquo; was deployed against iOS 15 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"apple_news_api_created_at":"2023-04-27T19:37:56Z","apple_news_api_id":"0e46237a-a186-428a-8f94-147f2da53361","apple_news_api_modified_at":"2024-09-17T00:45:57Z","apple_news_api_revision":"AAAAAAAAAAAAAAAAAAAAAQ==","apple_news_api_share_url":"https:\/\/apple.news\/ADkYjeqGGQoqPlBR_LaUzYQ","apple_news_coverimage":0,"apple_news_coverimage_caption":"","apple_news_is_hidden":false,"apple_news_is_paid":false,"apple_news_is_preview":false,"apple_news_is_sponsored":false,"apple_news_maturity_rating":"","apple_news_metadata":"\"\"","apple_news_pullquote":"","apple_news_pullquote_position":"","apple_news_slug":"","apple_news_sections":"\"\"","apple_news_suppress_video_url":false,"apple_news_use_image_component":false,"footnotes":""},"categories":[2],"tags":[2095,1326,140,31,2078,2185,2242,2657,71,48],"class_list":["post-39201","post","type-post","status-publish","format-standard","hentry","category-technology","tag-exploit","tag-homekit","tag-imessage","tag-ios","tag-ios-15","tag-ios-16","tag-lockdown-mode","tag-nso-group","tag-programming","tag-security"],"apple_news_notices":[],"_links":{"self":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/39201","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/comments?post=39201"}],"version-history":[{"count":2,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/39201\/revisions"}],"predecessor-version":[{"id":39211,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/39201\/revisions\/39211"}],"wp:attachment":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/media?parent=39201"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/categories?post=39201"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/tags?post=39201"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}