Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

3/21/2016
05:30 PM
Connect Directly
Twitter
RSS
E-Mail
100%
0%

iMessage Encryption Cracked, But Fixed In New iOS 9.3

While FBI fights with Apple over iPhone encryption, Johns Hopkins researchers find a weakness in secure IM on iOS, OSX.

A vulnerability in the encryption method used by iOS and OSX when transmitting iMessages would allow attackers to intercept messages and snoop on photos and videos, according to researchers at Johns Hopkins University today. The flaw was repaired in iOS 9.3, officially released today, and an update was also released for Mac OS X El Capitan v. 11 through v. 13.

Researchers provided some basics to the Washington Post. In the simulated attack, researchers targeted iPhones, and using an emulated Apple iCloud server, they obtained links to photos stored in iCloud sent by those phones, as well as 64-digit encryption keys.

From the Washington Post:

Although the students could not see the key’s digits, they guessed at them by a repetitive process of changing a digit or a letter in the key and sending it back to the target phone. Each time they guessed a digit correctly, the phone accepted it. They probed the phone in this way thousands of times.

“And we kept doing that,” [lead researcher and computer science professor Dr. Matthew Green] said, “until we had the key.”

According to the researchers' report, obtained by ThreatPost, the proof-of-concept attack took roughly 130,000 edits and 72 hours. An exploit to pilfer content from iMessages in-transit requires that the attacker already have have man-in-the-middle access. The vulnerability could also be used to decrypt content stored in undelivered iMessages -- which Apple stores on iCloud for up to 30 days -- but that would require that the attacker have already obtained access to the iCloud infrastructure, either via a separate exploit, or perhaps legal means like the FBI is currently pursuing.

This particular vulnerability would not help the FBI access the phone at the center of the controversy with Apple. However, Green commented to the Post:

“Even Apple, with all their skills — and they have terrific cryptographers — wasn’t able to quite get this right,” said Green, whose team of graduate students will publish a paper describing the attack as soon as Apple issues a patch. “So it scares me that we’re having this conversation about adding back doors to encryption when we can’t even get basic encryption right.”

“This does have a parallel with the FBI vs. Apple case," says Lamar Bailey, director of security research and development for cyber security company Tripwire, "as many technologists have speculated that the FBI could access the shooter's phone, if they decide to put in the effort. For example, the secure enclave can be backed up and the CPU serial number read so that the autowipe is bypassed or the encryption can be cracked offline. This is of course undesirable for the FBI as the process takes time and money on a much different scale from what it took when Apple could simply bypass the security measures of phones."

"This finding, not surprisingly, strengthens the argument that the government does not need backdoors -- there is always buggy software to lend them access, as aptly illustrated by Green's research," says Chenxi Wang, chief strategy officer for Twistlock. "This case - FBI vs. Apple - is merely FBI's ploy to establish a legal precedent. It has very little to do with whether the agency has the ability to hack the device." 

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
jastroff
50%
50%
jastroff,
User Rank: Strategist
3/22/2016 | 6:54:09 AM
Nature of the Problem
When does this become a zero-sum game, if it hasn't already?

And when this bulkhead is conquered, what is the next trouble spot in the war against terrorism vis-a-vis technology?
Can Your Patching Strategy Keep Up with the Demands of Open Source?
Tim Mackey, Principal Security Strategist, CyRC, at Synopsys,  6/18/2019
Florida Town Pays $600K to Ransomware Operators
Curtis Franklin Jr., Senior Editor at Dark Reading,  6/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-12928
PUBLISHED: 2019-06-24
The QMP migrate command in QEMU version 4.0.0 and earlier is vulnerable to OS command injection, which allows the remote attacker to achieve code execution, denial of service, or information disclosure by sending a crafted QMP command to the listening server.
CVE-2019-12929
PUBLISHED: 2019-06-24
The QMP guest_exec command in QEMU 4.0.0 and earlier is prone to OS command injection, which allows the attacker to achieve code execution, denial of service, or information disclosure by sending a crafted QMP command to the listening server.
CVE-2019-12936
PUBLISHED: 2019-06-23
BlueStacks App Player 2, 3, and 4 before 4.90 allows DNS Rebinding for attacks on exposed IPC functions.
CVE-2019-12937
PUBLISHED: 2019-06-23
apps/gsudo.c in gsudo in ToaruOS through 1.10.9 has a buffer overflow allowing local privilege escalation to the root user via the DISPLAY environment variable.
CVE-2019-12935
PUBLISHED: 2019-06-23
Shopware before 5.5.8 has XSS via the Query String to the backend/Login or backend/Login/load/ URI.