Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Google Says NSO Pegasus Zero-Click 'Most Technically Sophisticated Exploit Ever Seen'
SecurityWeek ^ | December 16, 2021 | Ryan Naraine

Posted on 12/16/2021 3:40:38 PM PST by Governor Dinwiddie

Security researchers at Google’s Project Zero have picked apart one of the most notorious in-the-wild iPhone exploits and found a never-before-seen hacking roadmap that included a PDF file pretending to be a GIF image with a custom-coded virtual CPU built out of boolean pixel operations.

If that makes you scratch your head, that was exactly the reaction from Google’s premier security research team after disassembling the so-called FORCEDENTRY iMessage zero-click exploit used to plant NSO Group’s Pegasus surveillance tool on iPhones.

“We assess this to be one of the most technically sophisticated exploits we've ever seen,” Google’s Ian Beer and Samuel Groß wrote in a technical deep-dive into the remote code execution exploit that was captured during an in-the-wild attack on an activist in Saudi Arabia.

Google said it received a sample of the exploit from Citizen Lab and collaborated with Cupertino’s usually secretive Security Engineering and Architecture (SEAR) group on a technical analysis that discovered a head-scratching array of technical sophistication in an exploit platform sold to governments around the world.

The researchers said the sophistication of the exploit is confirmation that hackers at the Israel-based NSO Group have technical expertise and resources to rival those previously thought to be accessible to only a handful of nation states …

(Excerpt) Read more at securityweek.com ...


TOPICS: Business/Economy; Crime/Corruption; Foreign Affairs; News/Current Events
KEYWORDS: apple; hack; ios; iphone
Very scary stuff. It's just a reminder that your "smartphone" [ha ha ha] is not so safe and not so smart.
1 posted on 12/16/2021 3:40:38 PM PST by Governor Dinwiddie
[ Post Reply | Private Reply | View Replies]

To: Governor Dinwiddie

smartphones are just tiny burst mode computers that betray your privacy every day.


2 posted on 12/16/2021 3:46:10 PM PST by ImJustAnotherOkie (Let's go Brandon)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Governor Dinwiddie

A very cool exploit...very impressive!


3 posted on 12/16/2021 3:47:15 PM PST by dinodino ( )
[ Post Reply | Private Reply | To 1 | View Replies]

To: Governor Dinwiddie

Virtualization is a powerful drug...


4 posted on 12/16/2021 3:48:03 PM PST by Paladin2 (Critical Marx Theory is The SOLUTION....)
[ Post Reply | Private Reply | To 1 | View Replies]

To: dinodino
Talk about "thinking outside the box"! Your brain has to work on an entirely different plane, well beyond my abilities.

The only very very remotely similar thing that I've ever seen is using the "sed" utility as a general purpose programming language. Because "sed" is Turing complete, someone actually decided to use it for writing nontrivial programs. Why? I guess, "just 'cause".

But the folks who wrote this exploit wrote their own 64 bit processor using pixels in a gif image. Wow. Genius.

5 posted on 12/16/2021 3:55:09 PM PST by Governor Dinwiddie (LORD, grant thy people grace to withstand the temptations of the world, the flesh, and the devil.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Governor Dinwiddie

When will someone stop all this stuff. Someday perhaps a true hero will emerge and vanquish the tech lords. None of it does a bit of good.


6 posted on 12/16/2021 3:56:51 PM PST by toddausauras (How far will the left go in terms of destroying our personal freedoms?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Governor Dinwiddie

“Describing the exploit as “pretty terrifying,” Google said the NSO Group hackers effectively booby-trapped a PDF file, masquerading as a GIF image, with an encoded virtual CPU to start and run the exploit.

“JBIG2 doesn’t have scripting capabilities, but when combined with a vulnerability, it does have the ability to emulate circuits of arbitrary logic gates operating on arbitrary memory. So why not just use that to build your own computer architecture and script that!? That’s exactly what this exploit does,” the researchers explained.

“Using over 70,000 segment commands defining logical bit operations, [NSO’s hackers] define a small computer architecture with features such as registers and a full 64-bit adder and comparator which they use to search memory and perform arithmetic operations. It’s not as fast as Javascript, but it’s fundamentally computationally equivalent.”

“The bootstrapping operations for the sandbox escape exploit are written to run on this logic circuit and the whole thing runs in this weird, emulated environment created out of a single decompression pass through a JBIG2 stream. It’s pretty incredible, and at the same time, pretty terrifying,” the Google researchers added.”

Holy crap!!! THAT took some brainpower. And lots of $$$.


7 posted on 12/16/2021 4:04:24 PM PST by Basket_of_Deplorables (Convention Of States is our only hope now! Desantis 2024!!!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Governor Dinwiddie

they recognized their own work...


8 posted on 12/16/2021 4:14:14 PM PST by Chode (there is no fall back position, there's no rally point, there is no LZ... we're on our own. #FJB)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Governor Dinwiddie

If we could just do this with GIFs of Obama, Biden, Harris, Pelosi, George Floyd........


9 posted on 12/16/2021 4:18:27 PM PST by VanShuyten ("...that all the donkeys were dead. I know nothing as to the fate of the less valuable animals)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Chode
#8: "they recognized their own work..."

Kind of a variation on “he who smelt it, dealt it.“.

10 posted on 12/16/2021 4:19:47 PM PST by Governor Dinwiddie (LORD, grant thy people grace to withstand the temptations of the world, the flesh, and the devil.)
[ Post Reply | Private Reply | To 8 | View Replies]

To: Governor Dinwiddie
I,m sorry, if a guy's name is Samuel Groß he needs to change it to Samuel Gross like it sounds.

But wait, he lives in Zürich, Switzerland, so I guess I'll give him a pass.   But then, why is his first name Samuel?

11 posted on 12/16/2021 4:23:22 PM PST by higgmeister ( In the Shadow of The Big Chicken)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Governor Dinwiddie

.


12 posted on 12/16/2021 4:25:53 PM PST by Chode (there is no fall back position, there's no rally point, there is no LZ... we're on our own. #FJB)
[ Post Reply | Private Reply | To 10 | View Replies]

To: Governor Dinwiddie
hackers at the Israel-based NSO Group have technical expertise and resources to rival those previously thought to be accessible to only a handful of nation states

Israel has been known to have some of the best of the best talent in the whole world. It was the Israeli team that saved Intel's bacon with the Core2Duo series. Until then, Intel had no way to remain competitive, especially in laptops.
13 posted on 12/16/2021 4:26:07 PM PST by Dr. Sivana ("There are only men and women."-- George Gilder, Sexual Suicide, 1973)
[ Post Reply | Private Reply | To 1 | View Replies]

To: dinodino
Wow!   To say the least.
14 posted on 12/16/2021 4:26:39 PM PST by higgmeister ( In the Shadow of The Big Chicken)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Governor Dinwiddie
From the article:

Following the documented Pegasus attacks, Apple filed a lawsuit seeking to hold NSO Group accountable for the ongoing surveillance hacks that target iOS-powered devices.

The U.S. government has since added NSO Group to its “entity list,” a move that blocks American companies from doing business with the Israeli spyware vendor.

Please note that the US government has exempted itself from such rules, where matters of "national security" arise.

I bet that the Jan 6 committee has already bought the exploit for use against US citizens enemies of the State.

15 posted on 12/16/2021 4:45:20 PM PST by texas booster (Join FreeRepublic's Folding@Home team (Team # 36120) Cure Alzheimer's!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Governor Dinwiddie

The government has access to those capabilities.


16 posted on 12/16/2021 4:51:28 PM PST by arthurus (covfefe *\*)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Governor Dinwiddie

That’s why you have to open these rando files in an editor and look at the actual hex chars in there. PDF files can contain executable javascript, or you could put a picture in there - jpg or such - and have that exploit the interpreter that decode and displays the image. Lots of ways to make things break.


17 posted on 12/16/2021 4:55:04 PM PST by glorgau
[ Post Reply | Private Reply | To 1 | View Replies]

To: Basket_of_Deplorables

> it does have the ability to emulate circuits of arbitrary logic gates operating on arbitrary memory.

This would be an exercise given to 3rd year computer science students taking a machine organization or architecture class. Would be a lot of fun actually.


18 posted on 12/16/2021 4:57:22 PM PST by glorgau
[ Post Reply | Private Reply | To 7 | View Replies]

more details on this
https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html
19 posted on 12/16/2021 5:00:31 PM PST by Steve Van Doorn (*in my best Eric Cartman voice* 'I love you, guys')
[ Post Reply | Private Reply | To 1 | View Replies]

To: Dr. Sivana

—”Israel has been known to have some of the best of the best talent in the whole world. “

Not to detract one iota from the Israelis, but everything we read in this article could simply be disinformation.
Intended to nudge a group of iPhone users in a preferred direction.

“a weapon against which there is no defense,”

“Short of not using a device, there is no way to prevent exploitation by a zero-click exploit,”

I would like to believe that somewhere we still have a functioning intelligence service?

And steganography is a thing.


20 posted on 12/16/2021 5:37:16 PM PST by DUMBGRUNT ("The enemy has overrun us. We are blowing up everything. Vive la France!"Dien Bien Phu last message)
[ Post Reply | Private Reply | To 13 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson