Original Article Text

Click to Toggle View

iPhone Triangulation attack abused undocumented hardware feature. The Operation Triangulation spyware attacks targeting iPhone devices since 2019 leveraged undocumented features in Apple chips to bypass hardware-based security protections. This finding comes from Kaspersky analysts who have been reverse-engineering the complex attack chain over the past year, trying to unearth all details that underpin the campaign they originally discovered in June 2023. The discovery and use of obscure hardware features likely reserved for debugging and factory testing to launch spyware attacks against iPhone users suggest that a sophisticated threat actor conducted the campaign. Moreover, it constitutes an excellent example of why reliance on security through obscurity and the secrecy of hardware design or hardware testing implementation is a false premise. Operation Triangulation Operation Triangulation is a spyware campaign targeting Apple iPhone devices using a series of four zero-day vulnerabilities. These vulnerabilities are chained together to create a zero-click exploit that allows attackers to elevate privileges and perform remote code execution. The four flaws that constitute the highly sophisticated exploit chain and which worked on all iOS versions up to iOS 16.2 are: The attacks start with a malicious iMessage attachment sent to the target, while the entire chain is zero-click, meaning it does not require interaction from the user, and doesn't generate any noticeable signs or traces. Kaspersky discovered the attack within its own network, and Russia's intelligence service (FSB) immediately accused Apple of providing the NSA with a backdoor against Russian government and embassy personnel. So far, the origin of the attacks remains unknown, and there has been no proof of these allegations. Apple fixed the then-recognized two zero-day flaws (CVE-2023-32434 and CVE-2023-32435) on June 21, 2023, with the release of iOS/iPadOS 16.5.1 and iOS/iPadOS 15.7.7. Highly sophisticated attacks Of the above flaws, CVE-2023-38606, which was addressed on July 24, 2023, with the release of iOS/iPadOS 16.6, is the most intriguing for Kaspersky's analysts. Exploiting the flaw allows an attacker to bypass hardware protection on Apple chips that prevent attackers from obtaining complete control over the device when they gain read and write access to the kernel memory, which was achieved using the separate CVE-2023-32434 flaw. In the deep-dive technical writeup, Kaspersky explains that CVE-2023-38606 targets unknown MMIO (memory-mapped I/O) registers in Apple A12-A16 Bionic processors, likely linked to the chip's GPU co-processor, which are not listed in the DeviceTree. Operation Triangulation uses these registers to manipulate hardware features and control direct memory access during the attack. "If we try to describe this feature and how the attackers took advantage of it, it all comes down to this: they are able to write data to a certain physical address while bypassing the hardware-based memory protection by writing the data, destination address, and data hash to unknown hardware registers of the chip unused by the firmware," explains Kaspersky's report. Kaspersky hypothesizes that including this undocumented hardware feature on the finished consumer version of the iPhone is either a mistake or was left in to assist Apple engineers in debugging and testing. Apple fixed the flaw by updating the device tree to restrict physical address mapping. However, how the attackers gained knowledge of such an obscure exploitable mechanism in the first place remains unknown.

Daily Brief Summary

NATION STATE ACTIVITY // Undisclosed iPhone Chip Features Used in Sophisticated Spyware Attacks

A spyware campaign named Operation Triangulation targeted iPhones using four zero-day vulnerabilities to bypass hardware security protections.

Kaspersky analysts uncovered that the campaign exploited undocumented Apple chip features, suggesting the involvement of a highly sophisticated actor.

The exploit chain required no user interaction and left no obvious traces, utilizing a malicious iMessage attachment to begin the attack.

Russia's FSB accused Apple of providing a backdoor for the NSA to spy on Russian government officials, but there's no evidence to support this claim.

Apple patched two of the vulnerabilities in question with its iOS/iPadOS 16.5.1 and 15.7.7 updates and addressed another critical flaw with iOS/iPadOS 16.6 release.

The most crucial vulnerability exploited a feature tied to the iPhone's GPU co-processor that was not intended for consumer use, allowing attackers to bypass memory protection.

Kaspersky theorizes the undocumented feature could be a holdover from testing or a mistake, emphasizing security risks of obscurity practices in hardware design.

The origin and knowledge source of the attackers regarding the obscure hardware feature remain unknown despite Apple's remediation efforts.