73 Matching Annotations
  1. Aug 2021
    1. Smith observed that one worker alone might make 20 pins in a day, but that a small business of 10 workers (some of whom would need to do two or three of the 18 tasks involved with pin-making), could make 48,000 pins in a day. How can a group of workers, each specializing in certain tasks, produce so much more than the same number of workers who try to produce the entire good or service by themselves? Smith offered three reasons.

      Pipelining too

  2. Jul 2021
    1. Frequently this website was running a random and sometimes obscure PHP application or CMS
    2. NSO Group rapidly shutdown many of their Version 3 servers shortly after the Amnesty International and Citizen Lab’s publications on 1 August 2018.
    3. The fingerprint technique is conceptually similar to the JA3S fingerprint technique published by Salesforce in 2019
    4. Amnesty International presented an excerpt of more than 600 domain names tied to NSO Group’s attack infrastructure
    5. most Pegasus process names seem to be simply disguised to appear as legitimate iOS system processes, perhaps to fool forensic investigators inspecting logs.

      Masquerade as Legitimate Application https://attack.mitre.org/techniques/T1444/

    6. Pegasus is no longer maintaining persistence on iOS devices
    7. System log files also reveal the location of Pegasus binaries on disk. These file names match those we have consistently observed in the process execution logs presented earlier. The binaries are located inside the folder /private/var/db/com.apple.xpc.roleaccountd.staging/ which is consistent with the findings by Citizen Lab in a December 2020 report.
    8. Pegasus has deleted the names of malicious processes from the ZPROCESS table in DataUsage database but not the corresponding entries from the ZLIVEUSAGE table.
    9. manipulation becomes evident when verifying the consistency of leftover records in the DataUsage.sqlite and netusage.sqlite SQLite databases.

      ..

    10. manipulate system databases and records on infected devices to hide its traces and and impede the research efforts of Amnesty International and other investigators

      ..

    11. These most recent discoveries indicate NSO Group’s customers are currently able to remotely compromise all recent iPhone models and versions of iOS. 
    12. Initially, many iMessage (com.apple.madrid) push notifications were received, and attachment chunks were written to disk
    13. multiple successful zero-click infections in May and June 2021. We can see one example of this on 17 May 2021. An unfamiliar iMessage account is recorded and in the following minutes at least 20 iMessage attachment chunks are created on disk.

      adding email to contact list to trigger user-discovery routine as a trigger for the infection.

    14. While we have not been able to extract records from Cache.db databases due to the inability to jailbreak these two devices, additional diagnostic data extracted from these iPhones show numerous iMessage push notifications immediately preceding the execution of Pegasus processes

      malware pushed using a legitimate app's push message. first of its kind of attack.

    15. iMessage look-up for the account linakeller2203[@]gmail.com on June 11th 2021 and malicious processes afterwards

      ..

    16. a random identifier tied to the attack attempt followed by the word "stadium".
    17. Both the free247downloads[.]com and opposedarrangements[.]net domains matched our Pegasus V4 domain fingerprint.

      ..

    18. 4th level domain structure and non-standard high port number as the 2019

      ..

    19. Although versions 14.4.1 and 14.4.2 were already available then, they only addressed vulnerabilities in WebKit, so it is safe to assume the vulnerability leveraged in these iMessage attacks was exploited as a 0-day.

      ..

    20. The same CloudFront website was contacted by com.apple.coretelephony and the additional processes executed, downloaded and launched additional malicious components
    21. the same iMessage account observed in the previous separate case was involved in this exploitation and compromise months later

      ..

    22. Amnesty International believes this to be the payload launched as gatekeeperd

      Masquerade as Legitimate Application https://attack.mitre.org/techniques/T1444/

    23. downloaded binary in the fsCachedData sub-folder, but it was unfortunately encrypted
    24. The Cache.db file for com.apple.coretelephony contains details about the HTTP response which appeared to have been a download of ~250kb of binary data
    25. a service fronted by Amazon CloudFront, suggesting NSO Group has switched to using AWS services in recent months
    26. We found traces of this HTTP request in a cache file stored on disk at /private/var/wireless/Library/Caches/com.apple.coretelephony/Cache.db containing metadata on the request and the response.
    27. HTTP request performed by the com.apple.coretelephony process. This is a component of iOS involved in all telephony-related tasks and likely among those exploited in this attack
    28. Pegasus is currently being delivered through zero-click exploits which remain functional through the latest available version of iOS at the time of writing (July 2021).
    29. This domain matched a distinctive fingerprint we devised while conducting Internet-wide scans following our discovery of the network injection attacks in Morocco
    30. HTTP request performed by the Apple Music app points to the domain opposedarrangement[.]net
    31. built-in apps such as the iTunes Store app can be abused to run a browser exploit while escaping the restrictive Safari application sandbox.
    32. if Apple Music was itself exploited to deliver the initial infection or if instead, the app was abused as part of a sandbox escape and privilege escalation chain
    33. It is interesting to note that in the traces Amnesty International recovered from 2019, the iMessage lookups that immediately preceded the execution of suspicious processes often contained two-bytes 0x00 padding in the email address recorded by the ID Status Cache file
    34. In many cases the same iMessage account reoccurs across multiple targeted devices, potentially indicating that those devices have been targeted by the same operator
    35. In many cases we discovered suspected Pegasus processes executed on devices immediately following suspicious iMessage account lookups
    36. iOS keeps a record of Apple IDs seen by each installed application in a plist file located at /private/var/mobile/Library/Preferences/com.apple.identityservices.idstatuscache.plist. This file is also typically available in a regular iTunes backup, so it can be easily extracted without the need of a jailbreak.
    37. However, while it is only effective on domestic networks, the targeting of foreign targets or of individuals in diaspora communities also changed

      possibly the malware synced in through rogue icloud accounts which were surreptitiously added to the target device, or through a trigger based on iMessage sync for a canary email address.

    38. Network injection is an effective and cost-efficient attack vector for domestic use especially in countries with leverage over mobile operators

      leverage with mobile operators can be used for redirection attacks. if mobile no is equal to this, when the user requests this url, redirect him to this url

    39. he discovery of network injection attacks in Morocco signalled that the attackers’ tactics were indeed changing
    40. iCloud accounts seem to be central to the delivery of multiple “zero-click” attack vectors in many recent cases of compromised devices analysed by Amnesty International
    41. Amnesty International found the same iCloud account bogaardlisa803[@]gmail.com recorded as linked to the “com.apple.private.alloy.photostream” service on both devices
    42. apps themselves may have been exploited or their functionality misused to deliver a more traditional JavaScript or browser exploit to the device
    43. OS Photos app or the Photostream service were used as part of an exploit chain to deploy Pegasus.
    44. crash reporting was disabled by writing a com.apple.CrashReporter.plist file to the device

      Install Insecure or Malicious Configuration https://attack.mitre.org/techniques/T1478/

    45. A process named pcsd and one named fmld appeared in 2018
    46. Amnesty International believes the roleaboutd and msgacntd processes are a later stage of the Pegasus spyware which was loaded after a successful exploitation and privilege escalation with the BridgeHead payload.
    47. com.apple.softwareupdateservicesd.plist file was modified

      Install Insecure or Malicious Configuration https://attack.mitre.org/techniques/T1478/

    48. _kBridgeHeadConfigurationFilePath in the libaudio.dylib file part of the Pegasus bundle
    49. configuration file located at /var/tmp/jb_cfg
    50. vulnerability in the iOS JavaScriptCore Binary (jsc) to achieve code execution on the device.
    51. network usage databases contained records of a suspicious process called “bh”. This “bh” process was observed on multiple occasions immediately following visits to Pegasus Installation domains.
    52. iOS maintains records of process executions and their respective network usage in two SQLite database files called “DataUsage.sqlite” and “netusage.sqlite” which are stored on the device. It is worth noting that while the former is available in iTunes backup, the latter is not. Additionally, it should be noted that only processes that performed network activity will appear in these databases.
    53. primarily attributed Pegasus spyware attacks based on the domain names and other network infrastructure used to deliver the attacks
    54. The domain baramije[.]net was registered one day before urlpush[.]net, and a decoy website was set up using the open source Textpattern CMS

      Network Traffic Capture or Redirection https://attack.mitre.org/techniques/T1410/

      Pegasus-ToDo

      Secops101

    55. his phone was redirected to an exploitation page at gnyjv1xltx.info8fvhgl3.urlpush[.]net passing through the domain baramije[.]net.

      Network Traffic Capture or Redirection https://attack.mitre.org/techniques/T1410/

    56. visited the website of French newspaper Le Parisien, and a network injection redirected him through the staging domain tahmilmilafate[.]com and then eventually to free247downloads[.]com as well. We also saw tahmilmilafate[.]info used in the same way

      Network Traffic Capture or Redirection https://attack.mitre.org/techniques/T1410/

    57. http://yahoo.fr, and a network injection forcefully redirected the browser to documentpro[.]org before further redirecting to free247downloads[.]com and proceed with the exploitation.

      Network Traffic Capture or Redirection https://attack.mitre.org/techniques/T1410/

    58. additional staging domains are used as trampolines eventually leading to the infection servers
    59. Session Resource logs
    60. Safari does not record full redirect chains, and might only keep history records showing the final page that was loaded

      Apple-ToDo

    61. Safari’s Session Resource logs provide additional traces that do not consistently appear in Safari’s browsing history
    62. app-specific WebKit local storage, IndexedDB folders,

      Pegasus-ToDo

    63. When previewing a link shared in his timeline, the service com.apple.SafariViewService was invoked to load a Safari WebView,

      [Closest match on the db] Drive-by Compromise https://attack.mitre.org/techniques/T1456/

    64. these redirects do not only happen when the target is navigating the Internet with the browser app, but also when using other apps
    65. For example, we could identify visits through Safari’s Favicon.db database, which was left intact by Pegasus

      Pegasus-ToDo

    66. well as potentially intentionally purged by malware
    67. network injection attacks performed either through tactical devices, such as rogue cell towers, or through dedicated equipment placed at the mobile operator

      Network Traffic Capture or Redirection https://attack.mitre.org/techniques/T1410/

    68. 4th level subdomain, a non-standard high port number, and a random URI similar to links contained in SMS messages previously documented

      Domain Generation Algorithms https://attack.mitre.org/techniques/T1520/

    69. suspicious redirects recorded in Safari’s browsing history

      Network Traffic Capture or Redirection https://attack.mitre.org/techniques/T1410/

    70. SMS messages with Pegasus exploit

      MITRE Mobile ATT&CK Void

    71. These also include so-called “zero-click” attacks which do not require any interaction from the target.

      MITRE Mobile ATT&CK Void

  3. Nov 2019
    1. Highlights can be created by clicking the button. Try it on this sentence.

      Here its like that