On the thirty seventh Chaos Communication Congress (37C3) held proper now in Hamburg, our consultants from the Kaspersky International Analysis and Evaluation Group (GReAT) Boris Larin, Leonid Bezvershenko and Grigoriy Kucherin gave a chat known as “Operation Triangulation: what you get when assault iPhones of researchers”. They described the chain of the assault intimately and talked about all the vulnerabilities concerned in it. Amongst different issues, they for the primary time offered exploitation particulars of the CVE-2023-38606 {hardware} vulnerability.
We won’t repeat all of the nuts and bolts of this report — you could find technical particulars in a put up on the Securelist weblog or you’ll be able to pay attention the recording of the discuss on the convention’s official web site. Right here we are going to briefly describe the details.
- As we have already got written at first of this summer time, the assault began with an invisible iMessage, which contained a malicious attachment that was processed with out the person’s data. This assault didn’t require any actions from the person in any respect.
- Our consultants have been in a position to detect the assault by monitoring a company Wi-Fi community utilizing our personal SIEM system Kaspersky Unified Monitoring and Evaluation Platform (KUMA).
- The assault employed 4 zero-day vulnerabilities that affected all iOS units as much as model 16.2: CVE-2023-32434, CVE-2023-32435, CVE-2023-41990 and the aforementioned CVE-2023-38606.
- The obfuscated Triangulation exploit might work each on fashionable variations of the iPhone and on pretty previous fashions. And if attacking newer iPhones it might bypass Pointer Authentication Code (PAC).
- The CVE-2023-32434 vulnerability utilized by this exploit, allowed attackers entry to all the bodily reminiscence of the machine on the person degree, each for studying and writing.
- Due to the exploitation of all 4 vulnerabilities, the malware might achieve full management over the machine and run any malware wanted, however as a substitute it launched the IMAgent course of and used it to take away all traces of the assault from the machine. It additionally launched the Safari course of within the background and redirected it to the attacker’s net web page with exploit for Safari.
- This Safari exploit received root rights and launched additional phases of assaults (which we already talked about them in our earlier publications).
- Vulnerability CVE-2023-38606 allowed bypassing of the built-in reminiscence safety mechanism utilizing undocumented and unused within the firmware processor registers. In keeping with our consultants, this {hardware} perform in all probability was created for debugging or testing functions, after which for some purpose remained enabled.
The one remaining thriller — how precisely did the attackers knew the way to use this undocumented perform and the place did they discover details about it in any respect.