|
| bsd44 wrote:
| "If Apple discovers activity consistent with a state-sponsored
| attack"
|
| I am really interested in understanding more about a "state-
| sponsored attack" as someone who works in Ops and has experience
| in CyberSec. All these years working in the industry and I had no
| idea you could identify an "attack" that easily.
| floatingatoll wrote:
| See also: _Apple sues NSO Group to curb the abuse of state-
| sponsored spyware_ (apple.com)
| https://news.ycombinator.com/item?id=29320986
| jaegerpicker wrote:
| For a company with the resources of Apple? I'd imagine their
| Threat Hunting/Identification and classification systems are
| top notch. There are a number of know taxonomies for different
| attacks around and I'm quite sure Apple has some automation
| around identifying those attacks. It even addresses that many
| will be false positives. Example taxonomy: https://us-
| cert.cisa.gov/CISA-National-Cyber-Incident-Scorin...
| _jal wrote:
| Where do you see the word 'easily' in Apple's statement?
|
| If the complaint is that attribution is sometimes sketchy, so?
| Sometimes it isn't.
| kube-system wrote:
| It's not easy.
|
| > Unlike traditional cybercriminals, state-sponsored attackers
| apply exceptional resources to target a very small number of
| specific individuals and their devices, which makes these
| attacks much harder to detect and prevent.
|
| > State-sponsored attackers are very well-funded and
| sophisticated, and their attacks evolve over time. Detecting
| such attacks relies on threat intelligence signals that are
| often imperfect and incomplete. It's possible that some Apple
| threat notifications may be false alarms, or that some attacks
| are not detected.
|
| Identifying the source of these attacks is often done by
| analyzing the tools and techniques, in comparison to other
| known tools and methods, and/or by information gathered in meat
| space.
| atmosx wrote:
| I believe it has to do with phishing attempts by known tools
| (NSO's Pegasus). If anyone has the resources to fend them off,
| fingerprint them, etc it is Apple, Microsoft and Google.
| gambiting wrote:
| Will it let them know that their own phone has decided that they
| are a potential pedophile and their photos will be sent
| unencrypted to some tech centre god knows where where someone
| will decide whether to report them to authorities or not? Or is
| that ok to keep secret?
| calebm wrote:
| https://en.wikipedia.org/wiki/Advanced_persistent_threat
| notkurt wrote:
| Has anyone put forward some theories as to how they are pulling
| this off? Are they tapping into iMessage Metadata, scanning crash
| logs, or something along those lines? While I totally understand
| the need for them to keep how they are doing this private, I do
| find it slightly concerning. Unless they are just flagging
| suspicious iCloud login attempts. If it's relating to crash logs,
| it would be nice to know as I'm sure a bunch of privacy focused
| users have that disabled.
| marcan_42 wrote:
| I assume they have iMessage metadata on what accounts the NSO
| accounts talked to. The contents are E2E encrypted, but unless
| they have explicitly promised not to keep logs, they probably
| have the metadata logged.
| gjsman-1000 wrote:
| Apple claims in their lawsuit that they have over 100 false
| iCloud accounts that were created, and is confident in their
| identities to the degree they are going to use them for
| standing to prove that NSO signed a legal agreement in the
| lawsuit.
|
| In which case, NSO f!@#ed up and left iCloud Messages Backup
| enabled, which stores unencrypted copies of the End-to-End
| messages and makes it trivial for Apple to alert any person
| that these accounts messaged to. That's one possibility.
| smoldesu wrote:
| Because the NSO group _definitely_ used iMessage to
| communicate with one another...
| TheGeminon wrote:
| This is more likely targeting phishing messages coming
| from NSO Group to victims, rather than communication
| between NSO members.
| HatchedLake721 wrote:
| Not with one another. With targets
| [deleted]
| randyrand wrote:
| It's likely much more manual that.
|
| They admit themselves that these attacks are not easy to
| detect.
| ben_palaskas wrote:
| completely and absolutely based. I have ambivalent feelings about
| apple
| BluSyn wrote:
| I see a lot of pessimism in the comments. But I think this is a
| great step in the right direction.
|
| Other companies should take note. More of this, please!
| Terry_Roll wrote:
| I think you can spot when your phone has been hacked, for
| example the mobile phone carriers can spot the traffic and slow
| down the communication making it obvious things are not working
| properly. Take using the AirBnB app, you put in a criteria, the
| results come back then the spooky hackers wipe the results and
| give you a list of their "safehouse" Airbnb locations meaning
| all you can do is book into one of their safe houses. The fact
| you see the AirBnB results get wiped and then slowly other
| results not really matching your criteria appearing should tell
| you, you could be booking into a safe house.
|
| Dating apps/websites is another way to get into a relationship
| with "undercover" investigators and I dont think most people
| are aware that any crime ever committed since birth can be
| prosecuted so as no one can predict what legislation might be
| hitting the books in the future, it might be hard to keep your
| nose clean.
|
| I think most people are aware of dodgy text messages which
| tends to be the start of malware entering your phone.
| varjag wrote:
| Google does this for some time at least.
|
| I received an imminent advanced security threat notification
| back in January 2019. Urging me to get one of those 2fa dongles
| (which I did). And just as well, because the next month my
| account was locked due to an attempted unathorized access.
|
| (whoever works on this at Google, thank you)
| jsnell wrote:
| Apple is like the last company in that space to do this. Google
| has had these warnings since 2012. Facebook, Microsoft and
| Twitter since 2015.
|
| (I agree that it's great that Apple is finally doing this. But
| it seems entirely par for the course for them to be a decade
| late and still get the credit.)
| punnerud wrote:
| I have never seen any warnings from Google or Facebook if I
| automate against my own accounts, and dumping the data. Only
| on sign-in attempts. That kind of warning is very limited,
| and Apple also have them.
|
| It seems like Apple now have introduced 'honey pots' and
| other techniques to discover if there already is someone with
| access to your account/device, and that is a big deal and
| good news. And something I have never seen from any of the
| other big companies.
| concinds wrote:
| The warning is for government-sponsored attacks, not any
| kind of automation.
|
| https://blog.google/threat-analysis-group/updates-about-
| gove...
| smoldesu wrote:
| I might care if Apple had a history of protecting US citizens
| from their own government, or shielding Chinese users from
| their own tyrannical surveillance systems.
| onethought wrote:
| ??? Are you referring to the storing of encryption keys for
| iCloud in country?
| smoldesu wrote:
| No, I'm referring to Apple's continued cooperation with
| surveillance agencies across the United States and all
| associated governments through the FIVE EYES program. The
| fact that your Macbook's security keys are trivial for the
| government to acquire is besides the point, but potentially
| germane if you, well, trusted your laptop in the first
| place.
| onethought wrote:
| Can you provide citation for this? Also how they are
| different from any other tech company?
|
| My MacBooks security keys are not trivial to acquire
| because they aren't in icloud.
|
| In some of the countries in five eyes nations, you don't
| have a choice about cooperating or not.
|
| But what do 5 eyes have to do with Chinese users?
| smoldesu wrote:
| > Can you provide citation for this?
|
| Apple's cooperation with PRISM[0] is well documented[1],
| but if you want to find the particularly damning details
| you'll need to do your own research. The dust has settled
| since the Snowden revelations, and many mentions of the
| program have been sterilized.
|
| > Also how they are different from any other tech
| company?
|
| It's not. But the claim that Apple puts extra effort into
| protecting you from your government is comical,
| especially if you live in a first-world country. It's
| also a false dichotomy, since there are definitely more
| secure devices you could be using. They're just not being
| manufactured by the largest, most valuable companies in
| the world.
|
| > My MacBooks security keys are not trivial to acquire
| because they aren't in icloud.
|
| That is indeed what the US would like you to think. It's
| no coincidence that Macbooks force you to use NIST-
| designed crypto for all of their services though, and if
| you've got a healthy degree of skepticism towards the
| same institute that backdoored Dual_EC_DRBG, it's safe to
| assume the rest of these ciphers are also vulnerable to
| differential cryptanalysis. Or just take what the NSA
| says at face value, that certainly won't cause any
| problems in the future. /s
|
| > But what do 5 eyes have to do with Chinese users?
|
| Also nothing, they have their own bespoke surveillance
| program since China cannot cooperate with the US like
| Britain or Canada can. In lieu of being able to break
| their encryption, China demanded that all of Apple's
| domestic data get stored on domestic servers. While
| Google, Microsoft, Yahoo and every other big tech company
| shied away from that kind of compliance with a known
| abuser of human rights, Apple happily complied with the
| request.
|
| [0] https://www.theguardian.com/world/2013/jun/06/us-
| tech-giants...
|
| [1] https://web.archive.org/web/20130609061546/https://ww
| w.culto...
| jsnell wrote:
| > Apple's cooperation with PRISM[0] is well documented[1]
|
| Neither of your links documents any kind of cooperation,
| let alone documenting it well.
| gjsman-1000 wrote:
| I shouldn't be arguing with the trolls - but in case
| anyone was curious about these (nonsense) allegations:
|
| Your links do not document cooperation with PRISM other
| than that the NSA believed they got information from
| them, which is very different. For all we know, it could
| have been the NSA abusing an API endpoint. Also, it said
| that it got lots of stuff like email, address, and so on
| _when all of these services were combined_ which made it
| PRISM.
|
| For all we know, it could have been checking the emails
| from Apple (because of FaceTime), getting address from
| Facebook, using address to look up other info on
| LinkedIn, and so forth. If anything, PRISM shows NSA
| abuse of services more than intentional compliance.
|
| > definitely more secure devices you could be using.
|
| I hate that I have to say this, but _Linux phones are not
| more secure_. They do have a company they don 't phone-
| home to, but if a Linux phone was found on the side of
| the road, I have no doubt that the NSA would find a way
| in (unlike the iPhone, which as lately as the Rittenhouse
| trial, the latest model has not been cracked and the
| government ultimately struck a deal with the defense for
| a PIN code).
|
| Linux phones are only secure _by obscurity_ in that less
| research has been done on them and they are less common -
| but if government agencies were (or are) putting some
| research cash into them, I would not be surprised if they
| burst open from a million attacks that iPhones and
| Androids have found and fixed over the last decade.
|
| > It's no coincidence that MacBooks force you to use
| NIST-designed crypto
|
| Stop being conspiratorial - almost _everyone_ , including
| many companies outside the US, use Curve25519 or P-256,
| and a big reason why is that the algorithm is very _fast_
| to calculate while being reasonably secure, which is a
| plus for fast encryption. Also, nobody has seriously
| alleged that Curve25519 is backdoor, unlike Dual_EC_DRBG
| which was suspect almost immediately. Also, NIST did not
| invent Dual_EC_DRBG. The NSA did and submitted it to NIST
| as a standard which NIST reluctantly accepted.
|
| > Shied away from that kind of compliance with a known
| abuser of human rights
|
| Yes - but Microsoft, Google, etc still make their phones
| in the same factories, and the reason they didn't hand
| over the server keys was because they don't really offer
| any services in China. Google doesn't work in China, and
| Microsoft's involvement is minor and China doesn't care
| because Windows doesn't encrypt data unless you have the
| Pro version and it's switched on. Also, your bias is
| showing in your use of Apple "happily" complying. How do
| you know that?
|
| I can go on.
| gjsman-1000 wrote:
| You shouldn't argue with @smoldesu, he has a history of
| trying to troll and spread FUD about Apple at every
| possible opportunity, even on completely unrelated
| topics. It's so ridiculous, a complaint about it is the
| #1 result on Google if you type "smoldesu" in. They also
| are not typically the most factual of complaints but they
| aren't interested in corrections. Beats me why the mods
| haven't sent warnings.
| ridaj wrote:
| Google's been doing this since at least 2012
| http://arstechnica.com/information-technology/2012/06/google...
| trasz wrote:
| Does this include US-sponsored threats?
| protomyth wrote:
| Why do I get the feeling that if the state is China, then it
| won't get reported as such. I assume their supply chain is more
| important.
| majou wrote:
| China has their own iCloud servers and keys, from what I
| understand they're happy enough with that.
| temac wrote:
| Also if the state if USA...
| zepto wrote:
| https://www.apple.com/legal/transparency/us.html
|
| Contains the canary: "To date, Apple has not received any
| orders for bulk data."
| grlass wrote:
| that appears to only be connected to requests under those
| specific acts.
|
| Otherwise, given their involvement in the PRISM program [1]
| I don't see how we can take that canary seriously.
|
| [1]
| https://en.wikipedia.org/wiki/PRISM_(surveillance_program)
| zepto wrote:
| The specific acts include FISA requests.
| [deleted]
| questiondev wrote:
| except in china, i pray that the people of the free world unite
| from within all countries and say enough is enough to their
| oppressors. it is wild to think that we still have ill actors in
| high ranks that are from bloodlines upon bloodlines of
| "ownership" of nations. there really still is a ruling class that
| has existed forever, sounds like a conspiracy until you look at
| who is buddies with who
| imarid wrote:
| I know of one case of a Polish prosecutor who does not obey (do
| not want to bend the law) Zbigniew Ziobro, who is both the
| minister of justice and the prosecutor general. She received a
| notification from Apple just today.
|
| Source:
| https://mobile.twitter.com/e_wrzosek/status/1463551631648251...
| pomian wrote:
| I think you need to add a translation of the tweet. Because it
| sounds as if he didn't obey Apple's warning. Yet I think he
| approves of Apple's s notification. It is the government who he
| wasn't obeying? So the government installed the spyware?
| awestley wrote:
| Translates to: "I just received an alert @AppleSupport about
| a possible cyberattack on my phone from state services. With
| the indication that I may be targeted for what I am doing or
| who I am. I will take the warning seriously because it was
| preceded by other incidents @ZiobroPL is this a coincidence?"
| dillondoyle wrote:
| Is it concerning to any security people with more knowledge
| than me that this is sent via iMessage?!
| avree wrote:
| iMessage is extremely secure and utilizes end-to-end
| encryption, why is this concerning to you?
| aroman wrote:
| And it has spam problems:
| https://www.wired.com/2014/08/apples-imessage-is-being-
| taken...
|
| The problem is authenticity and authority, not encryption.
| How can the user know this message really came from Apple
| and not a spammer?
| [deleted]
| simondotau wrote:
| That article is seven years old and in no way reflects
| current reality. In fact it has _never_ reflected my own
| experience or that of anyone I know, where iMessage spam
| has been near enough to non-existent.
|
| And even if there were a spam problem, the risk is mostly
| on the upside anyway. It would only be an issue if
| iMessage got a reputation for flooding people with
| admonishments to take security seriously, purportedly
| from Apple.
| natch wrote:
| >How can the user know
|
| Read the document of the original top post (the document
| from Apple).
|
| The answer to your question is right there in the
| document.
| cblconfederate wrote:
| What if it is illegal to do so?
| bell-cot wrote:
| From a pragmatic user's point of view, that would look just
| like "Apple didn't happen to notice that I was a target of
| state-sponsored activity". Recent headlines do not suggest that
| Apple's cyberdefenses are all that great against state-
| sponsored stuff.
|
| From a more philosophical point of view - expecting a large
| corporation to go mano a mano on your behalf, against a major
| state security organization...that's right up there with
| expecting Santa Claus to punish all the evil spies for being
| naughty.
| atmosx wrote:
| And yet, in the contact tracing case both Apple and Google
| refused to give data and control to EU governments. I believe
| the contact tracing app was used against protesters in
| rallies about BLM though, by the FBI IIRC.
| jaegerpicker wrote:
| I wonder if this could be used to expose those that are in
| sensitive position. IE offer attacks at people you think are in
| important positions and watch how they react to the news. For
| example if you work somewhere sensitive and you have an accounts
| not tied the Apple account. The State Sponsored group is probably
| good enough to see your traffic patterns and to see if they
| change after you have been notified. Not that I think Apple
| shouldn't do this but I can see someone being crafty and trying
| to take advantage of this. There are always trade offs in
| security!
| [deleted]
| Epitom3 wrote:
| "trust me bro"
| varispeed wrote:
| It's only possible because Apple is too big too fail. Probably
| they won't notify about the US snooping, but smaller countries
| often have smaller budgets that this company, so they can't
| really do anything about Apple pulling strings. It's a shame that
| smaller companies cannot do that without risking being closed
| down.
| boomboomsubban wrote:
| So something like PRISM that targets everybody won't trigger a
| warning?
| schleck8 wrote:
| It's rare that programmes like PRISM surface publicly. I don't
| see how Apple would gather top secret intel on national
| surveillance programmes on their own, so there is a good chance
| they aren't even aware.
| [deleted]
| funnyflamigo wrote:
| I doubt it.
|
| Keep in mind this will only work for non-court-gag-ordered
| instances. If the US subpoenas Apple about an individual they
| won't be allowed to notify them.
|
| I have no idea how this applies to other countries.
|
| I think this is more like: "We noticed unusual API usage and we
| don't have a gag order so whatever it is, it's not likely to be
| good"
| atmosx wrote:
| Probably related:
| https://www.apple.com/gr/newsroom/2021/11/apple-sues-nso-gro...
| thih9 wrote:
| I'm surprised to see protection against state sponsored attacks
| implemented by a company as big as Apple. Is any other
| 'mainstream' company offering a similar feature?
|
| Warrant canary [0] comes to mind, but that is usually a message
| to all users, as opposed to notifying an individual user.
|
| [0]: https://en.wikipedia.org/wiki/Warrant_canary
| varispeed wrote:
| > by a company as big as Apple
|
| Would smaller company stand a chance against very much any
| state? If men in suits taken a CEO of a big company for "a
| talk" in the forest there would be a lot of fuss in the media,
| whereas small company would probably be scared to bits and
| never said a word.
| melony wrote:
| A talk in the forest is for poor countries like Belarus. Rich
| countries just call their local SEC and IRS.
| suprfsat wrote:
| Gmail does it https://blog.google/threat-analysis-
| group/updates-about-gove...
| RL_Quine wrote:
| Yeah, I loved having my work gmail account peppered with a
| giant red banner warmomg "THIS ACCOUNT IS THE TARGET OF STATE
| SPONSORED HACKERS". That was fun. We didn't really know how
| to respond or attempt to mitigate such a warning so, left it
| ignored.
| ridaj wrote:
| Respond by using 2fa if you weren't already, not signing
| into the account from untrusted devices, checking OAuth
| grants for apps you don't recognize, not using same pw
| elsewhere
| schleck8 wrote:
| It's one of the largest enterprises against state-funded
| specialists and intelligence agencies, this will be an
| interesting arms race.
| zenlf wrote:
| Unless, it's Chinese government. In that case, Apple handle over
| their control over database to Guizhou-Cloud Big Data
| jetsetgo wrote:
| Or US. It's already running. So default.
| funman7 wrote:
| What if you opted in to the terms of the Chinese App Store then
| switch to USA.
| diegorbaquero wrote:
| You are asked to accept new ones when changing store location
| nabakin wrote:
| Now if only Apple wouldn't search for CSAM on device, allowed
| repair shops to get the parts they need from the manufacturer,
| and provided schematics for repair shops. If they did those
| things, I might actually buy an iPhone.
| kube-system wrote:
| I see a lot of people in the comments conflating legal requests
| and attacks. Regardless of your opinion on either of those
| issues, they _are_ different things.
| fsflover wrote:
| NSA surveillance is illegal. Will we be notified?
| kube-system wrote:
| By "legal request" I mean requests made through channels of
| the law. These things aren't "attacks" because they're
| functionally not attacks. 'Cooperation' is the antithetical
| to 'attack'.
|
| For example, when China demanded that iCloud for Chinese
| users was handed over to GCBD[0], and Apple complied, it was
| not, in any way, something that would be accurately described
| as an "attack". Apple cooperated with the demands that the
| legal environment presented.
|
| [0] https://www.apple.com/legal/internet-
| services/icloud/en/gcbd...
| [deleted]
| FridayoLeary wrote:
| Even if the state in question is the USA? I think Apple should be
| clear if there are any states whose attacks they might ignore,
| for the sake of privacy, of course.
| lurchpop wrote:
| What if the state is the US demanding data using NSLs or dragnet
| warrants?
___________________________________________________________________
(page generated 2021-11-24 23:00 UTC) |