Article Details

Scrape Timestamp (UTC): 2024-01-17 10:25:53.321

Source: https://thehackernews.com/2024/01/new-ishutdown-method-exposes-hidden.html

Original Article Text

Click to Toggle View

New iShutdown Method Exposes Hidden Spyware Like Pegasus on Your iPhone. Cybersecurity researchers have identified a "lightweight method" called iShutdown for reliably identifying signs of spyware on Apple iOS devices, including notorious threats like NSO Group's Pegasus, QuaDream's Reign, and Intellexa's Predator. Kaspersky, which analyzed a set of iPhones that were compromised with Pegasus, said the infections left traces in a file named "Shutdown.log," a text-based system log file available on all iOS devices and which records every reboot event alongside its environment characteristics. "Compared to more time-consuming acquisition methods like forensic device imaging or a full iOS backup, retrieving the Shutdown.log file is rather straightforward," security researcher Maher Yamout said. "The log file is stored in a sysdiagnose (sysdiag) archive." The Russian cybersecurity firm said it identified entries in the log file that recorded instances where "sticky" processes, such as those associated with the spyware, caused a reboot delay, in some cases observing Pegasus-related processes in over four reboot delay notices. What's more, the investigation revealed a the presence of a similar filesystem path that's used by all the three spyware families – "/private/var/db/" for Pegasus and Reign, and "/private/var/tmp/" for Predator – thereby acting as an indicator of compromise. That said, the success of this approach hinges on a caveat that the target user reboots their device as often as possible, the frequency for which varies according to their threat profile. Kaspersky has also published a collection of Python scripts to extract, analyze, and parse the Shutdown.log in order to extract the reboot stats. "The lightweight nature of this method makes it readily available and accessible," Yamout said. "Moreover, this log file can store entries for several years, making it a valuable forensic artifact for analyzing and identifying anomalous log entries." The disclosure comes as SentinelOne revealed information stealers targeting macOS such as KeySteal, Atomic, and JaskaGo (aka CherryPie or Gary Stealer) are quickly adapting to circumvent Apple's built-in antivirus technology called XProtect. "Despite solid efforts by Apple to update its XProtect signature database, these rapidly evolving malware strains continue to evade," security researcher Phil Stokes said. "Relying solely on signature-based detection is insufficient as threat actors have the means and motive to adapt at speed." Report: Unveiling the Threat of Malicious Browser Extensions Download the Report to learn the Risks of Malicious Extensions and How to Mitigate Them. Firewalls vs. Zero Trust: Minimize Your Attack Surface Learn latest trends in the attack landscape, attacker strategies, and how to implement Zero Trust Security.

Daily Brief Summary

CYBERCRIME // Lightweight iShutdown Method Detects iPhone Spyware Infection

Cybersecurity researchers have developed iShutdown, a new method to detect spyware on iOS devices.

The method locates traces of spyware like Pegasus in a system log file that documents each reboot event.

Kaspersky's analysis discovered reboot delays and file paths in "Shutdown.log" indicating spyware activity.

Sticky processes associated with spyware cause reboot delays, serving as indicators of compromise.

The efficiency of iShutdown depends on the frequency of device reboots, linked to the user's threat profile.

Kaspersky released Python scripts to help extract and analyze log files for anomalies.

The log file can keep entries for years, proving to be a significant forensic tool to identify irregular activities.

Separate research warned about the rapid evolution of macOS malware outpacing Apple's XProtect antivirus.