by el_duderino on 3/27/25, 12:49 PM with 124 comments
by nneonneo on 3/27/25, 9:04 PM
Many of these tricks are non-public, meaning that NSO would have had to spend a huge amount of time and effort researching every single one of these. They probably have many more tricks they know about and haven't used. And, Apple could patch every one of them in a future update and roll back all of that work.
There's a good reason why these exploits are expensive and only sent to a limited number of high-value targets. NSO this time around also worked to "protect their IP" using encryption to hide part of their exploit chain, presumably in a bid to avoid losing yet more of their precious zero-days to researchers.
What they're doing is pretty gross (particularly the whole spying-on-journalists bit), but you have to admit the level of technological sophistication and persistence here is pretty impressive.
by botanical on 3/27/25, 2:45 PM
by nxobject on 3/27/25, 6:30 PM
by ipython on 3/27/25, 3:26 PM
by danilonc on 3/27/25, 10:04 PM
If so, which aspects would it block? The Apple support page mentions that most message attachment types are blocked, *except* for certain images, videos, and audio. Given this, would Lockdown Mode have prevented this exploit?
by bawolff on 3/27/25, 10:46 PM
Lol, that got a chuckle out of me.
Amazing write up by google project zero as always.
by cedws on 3/27/25, 1:17 PM
I don’t always buy into the $safelanguage cargo cult but come on, it’s apparent that memory unsafe languages are not appropriate for this purpose and desperately need replacing.
by qingcharles on 3/28/25, 6:30 PM
(you can sometimes get this to allow you to upload and execute server-side scripting pages too)
by lukeh on 3/28/25, 12:35 AM
by TheDong on 3/27/25, 2:40 PM
How hard would it be for apple to have a setting of "Only receive messages from mutual contacts", and require the stranger to first "request to be added to contacts" (a message which is tightly controlled, and obviously doesn't include a pdf file or webp or whatever), and have the apple imessage server drop all other messages from them until I accept.
Signal has "message requests". iMessage doesn't have "message requests", and receives messages in a unique path which goes through the kernel.
Like, sure the attacker could hit my Mom with a wrench and iMessage me a PDF exploit that way, but I feel like requiring physical access to one of my contact's phones raises the bar significantly over the current state of affairs.