Two Apple Mail vulnerabilities being used to target iPhone, iPad users

Posted:
in General Discussion edited April 2020
Security researchers have discovered a pair of zero-day vulnerabilities in the Mail app for iPhone and iPad that they have found in the wild, and being used by attackers.

Researchers have found two zero-day vulnerabilities in Mail that were actively used to attack users. Credit: ZecOps
Researchers have found two zero-day vulnerabilities in Mail that were actively used to attack users. Credit: ZecOps


San Francisco-based cybersecurity firm ZecOps said that they came across the two flaws in the default iOS and iPadOS Mail app while running routine digital forensics on customer devices. After further investigation, they found evidence of targeted attacks, which they outlined in a report on Wednesday.

The vulnerabilities allow an attacker to run remote code by exploiting Apple's MobileMail and Mailid processes in iOS 12 and iOS 13, respectively, through the use of a specially crafted email. And, if triggered properly, a user wouldn't know that they were being hacked.

Variants of the flaw stretch back to at least iOS 6, the researchers said. Because the vulnerabilities were used to attack users before Apple could issue a patch, they're considered zero-day attacks, which is significant because iOS zero-days are extremely rare and often quite expensive.

By themselves, the flaws don't pose too much of a risk to users -- they only allow an attacker to leak, modify or delete emails. But combined with another kernel attack, such as the unpatchable Checkm8 exploit, the vulnerabilities could allow a bad actor root access to a specifically targeted device.

At least one of the flaws can be triggered remotely without any user interaction -- an attack known as a "zero-click." ZecOps added that the second vulnerability was likely discovered by accident while attempting to leverage the zero-click. The vulnerability impacting iOS 13 is the zero-click. While the iOS 12 flaw does require users to actually tap on an email, that requirement doesn't apply to attackers who send messages from a mail server that they control.

An example of a failed attack. Succesful ones wouldn't show an error message. Credit: ZecOps
An example of a failed attack. Succesful ones wouldn't show an error message. Credit: ZecOps


In its report, ZecOps found that a number of its customers were targeted, including employees at a Fortune 500 company in North America, a journalist in Europe and a VIP in Germany. Interestingly, while there was evidence that the flaws were executed on targeted devices, the emails themselves weren't present. That suggests that the attackers deleted the emails to cover their tracks.

The researchers believe that the attackers were working for a nation-state that had purchased the attacks from a third party, adding that at least one "hacker-for-hire" organization was selling exploits that use email as the main vector.

On the other hand, security researchers who spoke to Motherboard said that the flaw was relatively unpolished compared to other hacks, meaning that sophisticated attackers would probably deem it too risky to use against "high value targets."

Still, ZecOps notes that attacks using the exploits are likely to increase in frequency since they're now publicly disclosed. The researchers said bad actors will "attack as many devices as possible," meaning that normal users could end up targeted. That becomes more dangerous if the exploits were leveraged by cybercriminals with access to additional vulnerabilities.

The vulnerabilities only impact the native Mail application, and not third-party apps. To mitigate the attacks, ZecOps recommends that users stop using Mail on iOS and iPadOS until a patch is issued. MacOS is unaffected.

ZecOps said it alerted Apple to the vulnerabilities in February. Both of the flaws have since been patched in the latest beta releases of iOS 13, and a fix is set to arrive in the next publicly available iOS update in iOS and iPadOS 13.4.5
cornchip

Comments

  • Reply 1 of 18
    lkrupplkrupp Posts: 10,557member

    Still, ZecOps notes that attacks using the exploits are likely to increase in frequency since they're now publicly disclosed. The researchers said bad actors will "attack as many devices as possible," meaning that normal users could end up targeted. That becomes more dangerous if the exploits were leveraged by cybercriminals with access to additional vulnerabilities.


    But that never seems to actually happen, does it? We get these ominously scary predictions by security researchers advising us to hide under our beds and two days later nobody is talking about them, and life goes on. 

  • Reply 2 of 18
    maltzmaltz Posts: 453member
    lkrupp said:

    Still, ZecOps notes that attacks using the exploits are likely to increase in frequency since they're now publicly disclosed. The researchers said bad actors will "attack as many devices as possible," meaning that normal users could end up targeted. That becomes more dangerous if the exploits were leveraged by cybercriminals with access to additional vulnerabilities.


    But that never seems to actually happen, does it? We get these ominously scary predictions by security researchers advising us to hide under our beds and two days later nobody is talking about them, and life goes on. 


    Just because it's never happened to you, doesn't mean it never happens... There are plenty of examples where things like this affected tens of thousands (or more) people/websites/systems.
    edited April 2020 doozydozenMplsPprismatics
  • Reply 3 of 18
    22july201322july2013 Posts: 3,570member
    I guess you could do what we still do on Windows to protect ourselves - not read emails from unknown sources. However maybe the preview pane is part of the danger here if it "reads" email automatically.
    gilly33
  • Reply 4 of 18
    maltzmaltz Posts: 453member
    I guess you could do what we still do on Windows to protect ourselves - not read emails from unknown sources. However maybe the preview pane is part of the danger here if it "reads" email automatically.
    Nope. This is a zero-click on iOS 13. Merely receiving the email in the background is enough, you don't even have to open the Mail app. In fact, the entire email doesn't even have to be downloaded, so it could be deleted before you ever even see it. https://blog.zecops.com/vulnerabilities/unassisted-ios-attacks-via-mobilemail-maild-in-the-wild/
    PetrolDavegatorguyCloudTalkincgWerksdoozydozencornchip
  • Reply 5 of 18
    ApplePoorApplePoor Posts: 286member
    Sounds like just owning and using an iPhone using iOS 13means we are screwed 
    cornchip
  • Reply 6 of 18
    cpsrocpsro Posts: 3,198member
    Don't jump to using the Spark mail client that's been flogged on this site and others. It's developed by Eastern Ukrainians (Putin's friends) who will obtain the keys to your email.
    ZecOps says Outlook and Gmail are not vulnerable. I'm on the patched 13.4.5 beta but would otherwise probably just hold out for the 13.4.5 final.
    cornchip
  • Reply 7 of 18
    seanismorrisseanismorris Posts: 1,624member
    Is this one of the exploits that get removed with a reboot? And, they have to infect the machine all over again?
  • Reply 8 of 18
    tommy65tommy65 Posts: 56member
    Any exploit is bad news for Apple and her Users. This year I found lots of students with installed browser hooks and now mail... Apple should fix this ASAP since our current economy depends on work from homes and using mail daily as a way to keep in contact with friends and family.

  • Reply 9 of 18
    Rayz2016Rayz2016 Posts: 6,957member
    lkrupp said:

    Still, ZecOps notes that attacks using the exploits are likely to increase in frequency since they're now publicly disclosed. The researchers said bad actors will "attack as many devices as possible," meaning that normal users could end up targeted. That becomes more dangerous if the exploits were leveraged by cybercriminals with access to additional vulnerabilities.


    But that never seems to actually happen, does it? We get these ominously scary predictions by security researchers advising us to hide under our beds and two days later nobody is talking about them, and life goes on. 

    True enough, and coding is complicated so they'll continue to crop up. But if Apple is a responsible outfit then they should aim to fix before it becomes a problem.
    One day, it will.

  • Reply 10 of 18
    mpantonempantone Posts: 2,040member
    lkrupp said:

    But that never seems to actually happen, does it? We get these ominously scary predictions by security researchers advising us to hide under our beds and two days later nobody is talking about them, and life goes on. 

    You are wrong.

    ZecOps discovered the flaw in a forensic analysis of actual recorded security incidents. This isn't a theoretical vulnerability.

    They reported this vulnerability to Apple back in February. It is reasonable to believe that ongoing analysis since then continues to validate their findings. It also appears to be acknowledged by Apple as a legitimate threat based on Apple's fix in the most recent 13.4.5 beta.

    Apple may have silently conceded this a few months ago when they incongruously numbered the next iOS beta as 13.4.5 instead of incrementally following with 13.4.2. There is a good chance that Apple will release 13.4.2 with this vulnerability patched in the upcoming days rather than wait for the normal beta cycle of 13.4.5 to finish along its normal release timeline.

    It will be interesting to see if Apple releases security updates for previous iOS versions. I have two iDevices on iOS 12.4.1 since I refuse to upgrade to iOS 13. I have a third device on iOS 12.4.6 which is unable to upgrade to iOS 13.
    edited April 2020
  • Reply 11 of 18
    cpsrocpsro Posts: 3,198member
    ZecOps was able to identify the problem from crash reports on their client's phone. This suggests Apple should be doing more investigative work on crash reports.
    cornchip
  • Reply 12 of 18
    cgWerkscgWerks Posts: 2,952member
    maltz said:
    Nope. This is a zero-click on iOS 13. Merely receiving the email in the background is enough, you don't even have to open the Mail app. In fact, the entire email doesn't even have to be downloaded, so it could be deleted before you ever even see it. https://blog.zecops.com/vulnerabilities/unassisted-ios-attacks-via-mobilemail-maild-in-the-wild/
    I suppose these are the kinds of things know by 3-letter agencies they use to get into our devices rather than brute-force type cracking systems they claim to be buying/using?
  • Reply 13 of 18
    digitoldigitol Posts: 276member
    This is a pretty bad one! Updating to four five Beta now. :|
  • Reply 14 of 18
    yojimbo007yojimbo007 Posts: 1,165member
    So what are the effects.. what can they access with this exploit.
    And what can one do if one suspects they have already been targeted?
    How does one go about clearing/protecting the device till the new ios is released?
  • Reply 15 of 18
    bonobobbonobob Posts: 382member
    So what are the effects.. what can they access with this exploit.
    And what can one do if one suspects they have already been targeted?
    How does one go about clearing/protecting the device till the new ios is released?
    Settings > Passwords & Accounts > Fetch New Data.  Set to Off.  Then don't do a manual fetch.  Get your email from your Mac or a web page.
    cgWerkstommy65
  • Reply 16 of 18
    yojimbo007yojimbo007 Posts: 1,165member
    bonobob said:
    So what are the effects.. what can they access with this exploit.
    And what can one do if one suspects they have already been targeted?
    How does one go about clearing/protecting the device till the new ios is released?
    Settings > Passwords & Accounts > Fetch New Data.  Set to Off.  Then don't do a manual fetch.  Get your email from your Mac or a web page.
    Many Thanks Bonobob!
    I talked to Apple support ..
    They said the only way to be sure that there is no infection already is to completely erase and reset..... And then restore from backup.

    I did and went one step further and enrolled in beta and installed the ios 13.4.5 beta which addresses these vulnerabilities.

    It took a couple hours to get it all done and restored.

    Cheers🤙🏼 
  • Reply 17 of 18
    tommy65tommy65 Posts: 56member
    I do wonder if you install 13.4.5 and restore mail and other Apps from iCloud is the exploit still available to the hackers? Or does 13.4.5 only patch new attacks? Because one flaw leads easily  to the next as described in the article. Otherwise Users need to start from scratch with mail and their iPhone if it was mint in a box. Anyone any ideas?
    edited April 2020
  • Reply 18 of 18
    maltzmaltz Posts: 453member
    tommy65 said:
    I do wonder if you install 13.4.5 and restore mail and other Apps from iCloud is the exploit still available to the hackers? Or does 13.4.5 only patch new attacks? Because one flaw leads easily  to the next as described in the article. Otherwise Users need to start from scratch with mail and their iPhone if it was mint in a box. Anyone any ideas?

    13.4.5 patches the function that the Mail app uses that contains the vulnerability.  Besides, you can't restore old-version Apps from the cloud - you always just download the latest version.  It's the data only that's backed up to the cloud.
Sign In or Register to comment.