[HN Gopher] A deep dive into an NSO zero-click iMessage exploit:...
       ___________________________________________________________________
        
       A deep dive into an NSO zero-click iMessage exploit: Remote Code
       Execution
        
       Author : arkadiyt
       Score  : 479 points
       Date   : 2021-12-15 17:03 UTC (5 hours ago)
        
 (HTM) web link (googleprojectzero.blogspot.com)
 (TXT) w3m dump (googleprojectzero.blogspot.com)
        
       | mherdeg wrote:
       | Looking forward to seeing the PDF that implements FizzBuzz in the
       | NSO JBIG2 instruction set.
        
       | adabaed wrote:
       | Amazing.
        
       | ttul wrote:
       | TL;DR - the ending of the post is all you need:
       | 
       | "JBIG2 doesn't have scripting capabilities, but when combined
       | with a vulnerability, it does have the ability to emulate
       | circuits of arbitrary logic gates operating on arbitrary memory.
       | So why not just use that to build your own computer architecture
       | and script that!? That's exactly what this exploit does. Using
       | over 70,000 segment commands defining logical bit operations,
       | they define a small computer architecture with features such as
       | registers and a full 64-bit adder and comparator which they use
       | to search memory and perform arithmetic operations. It's not as
       | fast as Javascript, but it's fundamentally computationally
       | equivalent. The bootstrapping operations for the sandbox escape
       | exploit are written to run on this logic circuit and the whole
       | thing runs in this weird, emulated environment created out of a
       | single decompression pass through a JBIG2 stream. It's pretty
       | incredible, and at the same time, pretty terrifying."
        
         | EvanAnderson wrote:
         | This one will be another talking point right beside the
         | "arbitrary code execution in SNES games via controller inputs"
         | as a rebuke to arguments about even small systems (like an
         | image decompressor) being "made secure".
         | 
         | I also keep thinking "The Cylons would totally write an exploit
         | like this."
        
           | NikolaeVarius wrote:
           | Do we know for a fact the NSO group are in fact NOT Cylons?
        
         | johndoughy wrote:
         | They must have spent tons of engineering effort to create this
         | virtual computer to act as their foundation for further
         | exploits. They don't deserve any sympathy of course, but it
         | must really suck that their foundation disappears immediately
         | with the fixed vulnerability.
        
           | MutableLambda wrote:
           | I suspect once written it can be adapted to a wide range of
           | Turing complete instruction sets.
        
       | malshe wrote:
       | From the top of the article:
       | 
       | > We want to thank Citizen Lab for sharing a sample of the
       | FORCEDENTRY exploit with us, and Apple's Security Engineering and
       | Architecture (SEAR) group for collaborating with us on the
       | technical analysis.
       | 
       | This reminded me that NSO went after Citizen Lab on multiple
       | fronts. They even tried to use a spy to talk to JSR
       | (https://www.johnscottrailton.com) and make him say controversial
       | things, which could be later used to malign Citizen Lab. Darknet
       | Diaries covered this incident recently:
       | https://darknetdiaries.com/episode/99/
        
         | Etheryte wrote:
         | The transcript is such an intriguing read. You don't expect
         | these things to happen in real life, but yet here they are,
         | tie-cameras, pen recorders, driving circles around the block
         | and all.
        
           | malshe wrote:
           | 100% with you on this one. My life feels so boring in
           | comparison!
        
         | goblinux wrote:
         | Darknet Diaries is so good. To anyone who hasn't listened,
         | highly recommend. Jack hits a homerun each week and the story
         | about JSR and NSO was buck wild
        
           | goblinux wrote:
           | every other week release for the podcast, not weekly*
        
             | headmelted wrote:
             | every other week release for _STORIES FROM THE DARK SIDE OF
             | THE INTERNET*_
        
         | S_A_P wrote:
         | https://9to5mac.com/2021/12/15/pegasus-spyware-maker-nso-run...
         | 
         | hopefully this company is on the way out...
        
           | [deleted]
        
           | rhizome wrote:
           | I'd assume they're using the Erik Prince/Constellis business
           | model, taking some time off and getting the band back
           | together under a different name to do the same work.
        
         | trashcat wrote:
         | I literally just listened to this episode today. Some crazy
         | stuff.
        
       | w0mbat wrote:
       | One the one hand you've got people writing insanely complex hacks
       | like this. On the other hand there's the guy who was doing
       | whatever he wanted for years just by crafting dodgy plist files.
       | https://blog.siguza.net/psychicpaper/
        
       | dreamcompiler wrote:
       | This is quite clever, but fundamentally it's only possible
       | because of a buffer overflow. If the JBIG decoder had been
       | written in Rust (just to cite one example of a language safer
       | than C), this would have been impossible. Use dumb languages, pwn
       | valuable prizes.
        
         | enlyth wrote:
         | Rust, our saviour, the lord, Jesus and God itself, as is proven
         | in every HN comment thread
         | 
         | Edit: instant flagged for commenting anything non-positive
         | about the Rust evangelism cult
        
         | mtoner23 wrote:
         | lmfao of course theres a "use rust" comment on hacker news
        
       | Thorncorona wrote:
       | Since NSO is able to do these 0 click exploits on iphones does
       | this mean they have have hacked apple engs as well and have
       | copies of iOS lying around?
        
         | moyix wrote:
         | No, it just means that they've found vulnerabilities that can
         | be triggered without user interaction. This is entirely doable
         | by just fuzzing or reverse engineering the released iOS
         | binaries.
        
           | distantsounds wrote:
           | go ahead, fuzz your own iOS exploit. you make it sound like
           | someone just cranks one out before lunch.
        
             | bawolff wrote:
             | Entirely do-able by a team of experts with multimillion
             | dollar budgets over the course of probably many months,
             | doesn't sound at all similar to average hn commenter being
             | able to do it before lunch.
        
           | toxik wrote:
           | I mean, you're not going to fuzz your way to bit twiddling
           | together a small virtual computer inside of a compression
           | stream.
        
             | TechBro8615 wrote:
             | The blog says the PDF parsing was based on xpdf which is
             | open source.
        
             | moyix wrote:
             | Of course - but you can definitely fuzz your way to the
             | initial vulnerability. The VM stuff is done once you have
             | that vulnerability and are writing the actual exploit,
             | which is a manual process.
        
           | [deleted]
        
         | CPLX wrote:
         | That was my first guess reading this.
         | 
         | Like they just HAVE to have the source code right?
        
           | itsokimbatman wrote:
           | Nah that's what tools like IDAPro and Ghidra are for. You
           | don't need source although it does help.
           | 
           | That said, the particular component this targets is open
           | source. It's the JBIG2 decoder that is part of XPDF.
        
       | olliej wrote:
       | Ok, they apparently made a VM using just the JBIG2 logical
       | operators, that's both hilarious and amazing.
       | 
       | Still hate NSO though.
        
         | mmastrac wrote:
         | Not just a VM - effectively a computer. Holy crap that's
         | amazing (ly evil).
        
           | olliej wrote:
           | Right? I was using VM as a short hand - it is after all a
           | _virtual_ just more virtual than usual :)
        
             | netizen-936824 wrote:
             | I think VM is the correct term here. They are technically
             | emulating hardware
        
               | olliej wrote:
               | Yeah, but I also understand that in general parlance VM
               | means a higher level virtualization.
               | 
               | Eventually though you get into one of those annoying
               | simulation vs emulation style arguments so I'm happy to
               | accept either definition of VM, just as long as both
               | sides agree on what it is that they're discussing :)
        
             | jerf wrote:
             | It's _less_ virtual than usual; it has full access to and
             | control over the embedding process. This is an RM, a Real
             | Machine running in the original access space.
        
       | ivraatiems wrote:
       | It's a real shame that the people who came up with this exploit
       | are working for NSO and not on solving P = NP or something. I'm
       | sure if we got them and the ones working on crypto at NSA in a
       | room together, we'd have it and clean unlimited energy in a week.
       | 
       | I often feel sad thinking about how many brilliant engineers are
       | dedicating their time to helping governments spy on people or
       | other governments.
        
         | tester756 wrote:
         | People of this caliber are avaliable here:
         | 
         | https://ctftime.org/
         | 
         | Here you have a list of decade of performance of experts/top
         | competitors in:
         | 
         | security, reverse engineering, crypto, low lvl, malware
         | analysis, OS internals, memory corruption
         | 
         | some of them even work at Google Project Zero :)
        
         | inter_netuser wrote:
         | Dear sir, the entire NSA staff are currently plugging away on
         | that pesky P=NP problem, including datacenter janitors.
        
           | teh_infallible wrote:
           | I have suspected for awhile now that the bitcoin blockchain
           | is actually an attempt to break SHA-256. Bitcoin is built
           | around incentives, and it has created an incentive for people
           | all over the world to basically brute force this algorithm
           | and maintain a recursive set of low entropy outputs.
           | 
           | Which would make the btc blockchain an incredibly expensive
           | and valuable data set, for someone armed with the right
           | mathematical theory.
        
             | chockablock wrote:
             | How could you break it without destroying its value?
        
               | jaywalk wrote:
               | Why would the NSA care about destroying Bitcoin's value?
        
         | drorco wrote:
         | I think you could also say the same about gambling, porn and
         | other questionable industries.
         | 
         | The thing is, it's usually much easier making money off these
         | things then making money from solving impactful problems.
         | 
         | If you're a regular joe and you could spend your next 5 years
         | with a 100% chance of making millions for finding exploits, or
         | a 0.01% chance of solving P=NP, I think the irrational decision
         | would be picking the latter.
        
         | ASalazarMX wrote:
         | If they solved P = NP, their first intention would be selling
         | it to the highest bidder. NSO hackers are the digital
         | equivalent of mercenary soldiers.
        
           | sterlind wrote:
           | kinda like Werner von Braun, maybe. he just wanted to make
           | rockets. whether they were for Nazi Germany or the US didn't
           | matter, whether they were missiles or spacecraft didn't
           | matter, he just wanted to build them.
        
             | earthscienceman wrote:
             | Which we have a descriptive word for: unethical. The
             | colorful word would be: disgusting
        
               | sterlind wrote:
               | "When the rockets go up, who cares where they come down?
               | That's not my department, says Werner von Braun." ~ Tom
               | Lehrer
        
           | xiphias2 wrote:
           | They don't really have to, they can just mine Bitcoin by
           | reversing SHA256 in polynomial time, inspect https messages
           | to banks, or send Bitcoin to themselves by creating an ECDSA
           | signature... or just set up a software as a service and have
           | the biggest business in the world.
        
         | inasio wrote:
         | I don't see anything fundamentally novel here, other than we're
         | not going to be just laughing at weird things that turn out to
         | be Turing complete, they're all practical intrusion vectors
         | now.
        
         | rowanG077 wrote:
         | I feel the opposite. All this stuff and even more hardcore
         | crypto stuff is all relatively simple math. It's not even close
         | to comparable to the things mathematicians do. Or even what
         | physicist have achieved with LHC or fusion research.
        
           | vore wrote:
           | Surely cracking cryptographic algorithms is pretty hard math
           | given people don't have that much success with it, even with
           | a huge incentive (decrypting all communications worldwide)?
        
             | rowanG077 wrote:
             | It's considered to be impossible. I doubt there is much (if
             | any) serious research going on to mathematically crack RSA
             | or ECC. Besides that is not what OP was talking about. That
             | was about hackers finding standard vulnerabilities in code
             | and exploiting it. Not about any mathematical flaws in
             | crypto.
        
         | medion wrote:
         | I feel the same way about all the smart engineers solving
         | problems for Facebook, Twitter, etc...
        
         | xxpor wrote:
         | Kind of ironic to use P = NP as an example of something to work
         | on considering the biggest implications of proving P = NP :)
        
           | detritus wrote:
           | Forgive my ignorance, but what would they be - the complete
           | implosion of all forms of known security, or something else?
           | 
           | This is a bit beyond my ken :)
        
             | snarf21 wrote:
             | Among other things, mostly encryption. Most of our current
             | methods depends on P != NP. So no need for 0 days if you
             | can just read at encrypted data as if it wasn't.
        
             | kingaillas wrote:
             | Well for one, the safety of encryption rests on certain
             | problems being intractable. (In a theoretical sense; there
             | are always implementation bugs that destroy security).
             | 
             | If P=NP, then those previously thought to be intractable
             | problems, are actually tractable. And the foundation of a
             | lot of security-related engineering collapses.
        
               | nafey wrote:
               | Is proving P = NP equivalent to knowing how any
               | intractable problem can be solved? Is it possible for
               | P=NP and yet a class of intractable problems to remain
               | unsolved?
        
               | kingaillas wrote:
               | It would mean that a large class of problems that have
               | solutions that can be verified quickly can be solved
               | quickly. Which cuts both ways.
               | 
               | While that means most protocols used for cryptography
               | would need to be replaced (hashing, digital signatures,
               | etc) it also means other combinatorics algorithms
               | (traveling salesman, protein structure prediction) would
               | become solvable which may been boon for logistics and/or
               | computational science.
               | 
               | (I think this is correct) If P=NP there will still be
               | intractable problems; they would be ones where the
               | solutions can't be verified in polynomial time... along
               | the lines of verifying the solution is correct is as
               | complicated as brute forcing the solution.
               | 
               | Note: it's been a while since my computation theory
               | class. ;) I am reading over
               | https://en.wikipedia.org/wiki/P_versus_NP_problem and
               | relearning the fine house of cards theoreticians have
               | divided this problem into. There is a "consequences of
               | P=NP" towards the bottom that sums it up better than I
               | can.
        
               | xxpor wrote:
               | There's also the chance that while we may be able to come
               | up with a polynomial algorithm for integer factorization,
               | it's not actually practical to run still. Remember
               | computational complexity discards the constants on that
               | polynomial. Practically speaking x^2 + x is a lot
               | different from 2^64 _x^2 + 2^32_ x + 2^16 :)
        
             | r00fus wrote:
             | Yes. Just like in that movie _Sneakers_
        
         | jack_pp wrote:
         | Why do you think some random hacker is smarter than all the
         | academics we have? Somehow clean unlimited energy isn't
         | achieved because people are working on exploits or optimizing
         | ad revenue? I doubt it.
        
           | that_guy_iain wrote:
           | Because they were smart enough to go where the money is?/s
        
         | vmception wrote:
         | It just is another example that bug bounties are undervalued
         | and the experience doing anything "white hat" is too disastrous
         | to be worth it.
         | 
         | Responsible disclosure is for the gullible.
         | 
         | The market keeps saying "this is what its worth"
        
         | eevilspock wrote:
         | _"The best minds of my generation are thinking about how to
         | make people click ads. That sucks."_
         | 
         | ~ Jeff Hammerbacher, fmr. Manager of Facebook Data Team,
         | founder of Cloudera
         | 
         | This quote isn't just about people working directly on ad tech
         | and ad targeting algorithms, but _any_ product that is  "free"
         | and ad supported.
        
           | cycomanic wrote:
           | As a side note I just went to the Cloudera website, because I
           | did not know about the company.
           | 
           | After selecting "Reject all" in the cookie dialog, the cookie
           | was literally spinning (they have a spinning wheel animation
           | for processing your cookie response!) for >5s on "We are
           | processing your cookie settings request". If this is what the
           | best minds of our generation are achieving then help us god!
        
         | futharkshill wrote:
         | You would be surprised at the skills at the highest level of
         | academia.
        
         | NmAmDa wrote:
         | I am not sure what do you mean with unlimited energy here, is
         | it literal or metaphor but I sense a second law of
         | thermodynamics violation.
        
       | nlh wrote:
       | As other have commented, this is absolutely mind-bogglingly hard
       | core. Kudos to the NSO group engineers who designed and built
       | this (regardless of your allegiances and whether you like or
       | dislike that they do this and whether it's objectively good or
       | evil or somewhere in between, you have to admit that it's deeply
       | technically impressive).
       | 
       | Does anyone have a sense of who they sold this to and who used
       | this particular 0-click exploit?
        
         | saiya-jin wrote:
         | Sorry but can't agree here - this stuff is proper evil for most
         | of world population, which includes also most of HN readers (no
         | its not just SV and 5 other guys). Its more often than not used
         | to oppress common citizens, freedom thinkers and truth sayers.
         | 
         | They are actively making this world a much worse place long
         | term, and why - pure greed for money and power. They don't even
         | try to act like there is some moral / law filter when choosing
         | their customers.
         | 
         | NSO as company is a highly amoral business too, kind of goes
         | hand in hand.
        
           | jstanley wrote:
           | I don't think any of what you said refutes the point that
           | this is deeply technically impressive.
        
         | 2OEH8eoCRo0 wrote:
         | I admire its purity.
         | 
         | > Does anyone have a sense of who they sold this to and who
         | used this particular 0-click exploit?
         | 
         | From the article:
         | 
         | > Earlier this year, Citizen Lab managed to capture an NSO
         | iMessage-based zero-click exploit being used to target a Saudi
         | activist.
        
         | xiphias2 wrote:
         | My country's dictator (Viktor Orban) uses it to spy against the
         | opposition and the president to make sure that he keeps control
         | of Hungary. I would give more kudos to NSO if they helped us
         | get rid of corruption in my country.
        
         | rodgerd wrote:
         | > regardless of your allegiances and whether you like or
         | dislike that they do this and whether it's objectively good or
         | evil or somewhere in between, you have to admit that it's
         | deeply technically impressiv
         | 
         | Might as well praise German logistics circa 1940-1945.
        
         | tata71 wrote:
         | Some subset of their expansive customer list.
         | 
         | This isn't a one-time thing. They're a funnel.
        
       | agustif wrote:
       | Thanks god you can remove Messages.app nowadays
        
         | scintill76 wrote:
         | How? I just tried, and I could only remove it from the home
         | screen.
        
         | jethro_tell wrote:
         | can you substitute a messaging app of your choice like on
         | android?
        
       | EvanAnderson wrote:
       | I see "...a small computer architecture..." in the article and my
       | instinct is to ask "Yeah-- but can it run DOOM?"
        
         | coolspot wrote:
         | And since you already have graphical output, because it is a
         | GIF displayed in iMessage, and you have access to gestures,
         | since you exploited OS and can get access to any input, you
         | should be able to have fully playable DooM in iMessage! You can
         | even share that game with friends (who run unpatched iOS)!
        
       | walrus01 wrote:
       | > iMessage has native support for GIF images, the typically small
       | and low quality animated images popular in meme culture. You can
       | send and receive GIFs in iMessage chats and they show up in the
       | chat window. Apple wanted to make those GIFs loop endlessly
       | rather than only play once,
       | 
       | Any chat or message software you want to be REALLY secure should
       | not have support for rich media of any type. I am even suspicious
       | and skeptical that Signal supports embedding animated images.
       | 
       | I can name exploits of this type on desktop PC operating systems
       | going back probably 22-23 years...
       | 
       | I do realize that lack of rich media inline in messages is a non
       | starter for most non-technical consumer end users.
        
         | mlindner wrote:
         | Signal lets you embed animated images but they still won't let
         | you send native resolution images from your phone to someone
         | else. Signal drastically recompresses any image sent. The only
         | end to end encrypted software I know of that allows that is
         | iMessage.
        
           | nightpool wrote:
           | How could Signal recompress images while retaining end-to-end
           | encryption? Wouldn't any "recompression" happen entirely on
           | the client-side, and therefore be fair game for hackers to
           | bypass with their own payloads?
        
             | walrus01 wrote:
             | It's my understanding that the signal client which is
             | sending the image reads the jpg/png/whatever image file
             | from local storage, recompresses it local client side, and
             | then sends the smaller version.
        
               | sterlind wrote:
               | then that offers no security at all, since an attacker
               | could use a hacked client. unless clients also refuse to
               | receive anything but one, very well-validated, format, so
               | that sending anything funky would be futile.
        
               | bscphil wrote:
               | No, just have the server reject anything at the
               | /SendMessage endpoint over a certain size; presumably the
               | client is resizing / recompressing images to hit a
               | specific target.
        
               | pornel wrote:
               | That won't help much.
               | 
               | * Compressing to a file size limit is actually
               | difficult/expensive. Tools usually target some good-
               | enough quality level, and then the file size depends on
               | remaining entropy in the image. The limit would need to
               | be conservatively high.
               | 
               | * Exploits aren't necessarily larger than an average
               | image. Adversaries in this case are quite skilled, and
               | may be able to codegolf it if necessary.
        
               | walrus01 wrote:
               | there is no 'server' in a signal client-to-client link
               | except as a directory server for the clients to find each
               | other
        
             | anchpop wrote:
             | they definitely don't do this, but in principle they could
             | use homomorphic encryption to do the compression server-
             | side with zero knowledge
        
               | bawolff wrote:
               | Not an expert on this so i might be wrong, but pretty
               | sure in homomorphic encryption, you can't run an
               | algorithm that reduces the size of the encrypted payload.
               | Like you could recompress and after decrypting the result
               | is smaller, but that only happens after decrypting.
               | 
               | Besides, its also totally impractical.
        
               | sterlind wrote:
               | nope! you can reduce the size. trivial example is just
               | XOR: Enc(A) xor Enc(B) = Enc(A^B).. 2 bits in, one bit
               | out.
               | 
               | what you can't do is implement variable-size compression
               | like Huffman trees. if you think about implementing
               | Huffman as a circuit, you have a fixed length output -
               | the worst-case length. you can't read the output any more
               | than you can read the input, so you don't know how much
               | padding you can throw away. therefore it's useless.
               | 
               | the same principle applies to running any algorithm that
               | has a dynamic computational complexity. so you can run a
               | Turing machine in FHE, but you won't know when it halts.
        
             | sneak wrote:
             | https://sneak.berlin/20210425/signal-is-wrecking-your-
             | images...
             | 
             | It's done clientside, and you can't remove it (on iOS)
             | because only official Signal-published builds will receive
             | push notifications of new messages from Signal servers (via
             | APNS).
             | 
             | This doesn't apply to a sender of an exploit, but does
             | apply to normal people who wish to send full res images or
             | patch out the DRM in the Signal app.
        
       | julietdg wrote:
       | There has been something called a Pegasus framework on my iphones
       | since the 5s and now in my xr. I have seen other people question
       | the same thing on apple dev site but just as i never got a
       | response from apple about what it actually is, neither have they.
       | There is also a Pegasus Arm64 too.
        
       | usmannk wrote:
       | This is mind boggling. NSO used a compression format's
       | instructions to create logic gates and then from there "a small
       | computer architecture with features such as registers and a full
       | 64-bit adder and comparator which they use to search memory and
       | perform arithmetic operations", all within a single pass of
       | decompression. Combine this with a buffer overflow and you've got
       | your sploit.
        
         | airstrike wrote:
         | That reads like some handwavy explanation of a hack in a movie
         | scene...
         | 
         | "Now I just have to embed a 64-bit computer architecture into
         | my compression algorithm and... boom. We're in."
        
           | athenot wrote:
           | Then you can "Enhance".
           | 
           | https://www.youtube.com/watch?v=Vxq9yj2pVWk
           | 
           | Joking aside, this does illustrate the "magical" properties
           | of technology to the layperson. As a corollary, failure modes
           | end up quite suprising and hard to reason about without a
           | certain amount of proficiency in these technologies.
        
             | fulafel wrote:
             | Well, that and the explanation is missing the details.
             | Conceptually being able to construct something like that
             | from XOR and NOT primitives is stuff from undergrad
             | computer engineering curriculum. But it's certainly a
             | respectable feat to find this combination of compression
             | format and the vulnerability therein of all the supported
             | formats, and think to apply it like this.
        
             | vmception wrote:
             | Enhancing works with trained AI these days
             | 
             | Maybe not for evidence collection, but for pleasing a human
             | being to go follow a lead sure
        
               | Jerrrry wrote:
               | >Maybe not for evidence collection,
               | 
               | Kyle Rittenhouse was possibly almost convicted due to
               | "enhance with AI".
        
               | vmception wrote:
               | Bring it up with the appeals court in the event it
               | occurs, unless you run out of money. Dont run out of
               | money.
        
               | danaris wrote:
               | I've seen some examples of this. It's very clearly
               | trained on a white-male dataset.
               | 
               | I've also seen it "enhance" an image of a resistor into a
               | human face.
               | 
               | I don't care how much AI you have, you can't add back
               | data that wasn't in the original image. The best you can
               | hope to do is get a vague approximation, and you _must_
               | have a very, very good (comprehensive) training dataset
               | for that to be remotely viable.
        
               | pizza wrote:
               | The premise of the technology is not adding more
               | information to the image. But rather realizing that the
               | image may have a description that is a lot smaller than
               | its file size suggests; then it becomes a matter of
               | rendering it using world-aware encodings. The resolution
               | may appear higher but it is actually a filtration of the
               | original data. And there's nothing to say that simply
               | because the current technology is overfitted to their
               | present-day datasets, that such a filter (that is
               | actually useful for common images, or enhancement by
               | leveraging known/ few-shot other examples consisting of
               | the same target object) cannot exist.
        
               | Zigurd wrote:
               | > _It 's very clearly trained on a white-male dataset._
               | 
               | TBF the Beatles look amazing in the Peter Jackson
               | documentary, though the original material was shot on
               | 16mm.
        
         | inasio wrote:
         | It seems we're now at the point where anything Turing complete
         | can be a vector. Wow...
        
           | sterlind wrote:
           | this wasn't Turing-complete until they exploited it to make
           | it so. JBIG2 executes arbitrary binary bitmap operations, but
           | sequentially (no looping.) using the exploit they presumably
           | found a way to send it into a loop, probably by overwriting
           | the pointer to the next segment or something.
           | 
           | theoretically I guess you don't need that, but you'd have to
           | send a payload linear in size to the number of cycles
           | expected to run the shellcode, and that wouldn't lend itself
           | to a processor-like design - it'd just be too big.
        
           | formerly_proven wrote:
           | Basically anything that exceeds the regular category is risky
           | and difficult to secure. See weird machines / langsec. This
           | is a prime example.
        
         | robotnikman wrote:
         | Its amazing how they took a buffer overflow and ran with it to
         | create a whole turing complete machine. Its mind boggling how
         | complex these exploits can be, no wonder they sell for millions
        
           | toxik wrote:
           | It also demonstrates how much more work there is after
           | "buffer overflow" until you get to RCE.
        
             | onphonenow wrote:
             | Now - that is a big change.
             | 
             | Historically the jump from overflow to RCE was much much
             | shorter.
             | 
             | Still the iMessage attack surface is just massive and
             | running in an unsafe language kind of crazy?
        
               | MayeulC wrote:
               | > Historically the jump from overflow to RCE was much
               | much shorter.
               | 
               | Not really. I am about to read the article, but it sounds
               | like return-oriented programming[1] chaining "gadgets"
               | that are small bits of existing code that you can re-
               | purpose into executing arbitrary code by manipulating the
               | stack. Extremely common exploitation technique, even if
               | not trivial. Who said an exploit or RCE was trivial to
               | exploit?
               | 
               | Edit: I was a bit quick to dismiss. The technique is
               | certainly interesting, although the article doesn't go
               | into the details of how the control flow is handled and
               | where that register is stored. However, I'd like to point
               | out that ROP is quite complex on its own, as it's kind of
               | like using a computer with an arbitrary instruction set
               | that you have to combine to create higher-level
               | functions, hence my original confusion.
               | 
               | [1] https://en.wikipedia.org/wiki/Return-
               | oriented_programming
        
               | tmsbrg wrote:
               | I think what he means with historically is before ASLR,
               | DEP, and other mitigations, where a buffer overflow meant
               | you can simply overwrite the return pointer at ESP, jump
               | to the stack and run any shellcode. Mitigations have made
               | exploitation much, much more complex nowadays. See for
               | example https://github.com/stong/how-to-exploit-a-double-
               | free
        
               | saagarjha wrote:
               | ROP chains are similar in spirit but typically created by
               | hand and thus not all that long (several dozen steps, at
               | most). Creating a 70,000 step program via a Turing tarpit
               | is very interesting.
        
               | MayeulC wrote:
               | > 70,000 step program
               | 
               | My initial assumption was that they would compile a
               | program, take the binary output as an image and
               | JBIG2-compress it, as I don't really get how they would
               | use the result of the binary operations to branch to
               | different code. Reading the article a bit more, I think
               | they can loop multiple times over the area, by changing
               | _w_ , _h_ and _line_ dynamically over each pass, which
               | would give them some kind of basic computer. That part is
               | still unclear to me, but that would indeed be a lot more
               | impressive.
               | 
               | There are no details on how control flow is handed over
               | to the program either, so it's possible that they loop
               | multiple time over the scratchpad (1 loop = 1 clock cycle
               | roughly), especially if the memory area is non-
               | executable, and they have one shot at computing a jump
               | pointer.
               | 
               | In any case, they can probably copy arbitrary memory
               | addresses into the new "scratchpad" area to defeat ASLR
               | (we'll see in part 2).
        
               | saagarjha wrote:
               | iOS does not allow the modification or generation of new
               | executable code (at least, it will not at this stage of
               | an exploit). So they are likely creating a weird machine
               | to patch various data and then redirecting control flow
               | with the altered state by overwriting a function pointer.
        
               | onphonenow wrote:
               | Right, and they get there of a decomp pass on totally
               | untrusted input over the network. This is why it's so
               | crazy that apple has this huge attack surface.
               | 
               | My own suggestion. Ascii only messages if contact is not
               | in address book or is a contact you've communicated with
               | in your message history (however long you keep that) up
               | to 1 year. Once you reply these untrusted saudi contacts
               | can send you the gif meme's.
        
               | snovv_crash wrote:
               | "Hello this is the state police, your mother just got in
               | a car accident, please respond"
        
               | rhizome wrote:
               | [ _calls phone number_ ]
        
               | itp wrote:
               | Suffice it to say, this exploit was not simply chaining
               | gadgets.
        
               | MayeulC wrote:
               | Right, my bad. I now read the article, the technique is
               | intriguing, but I can't say much more for lack of
               | details!
        
         | ChuckMcM wrote:
         | I read through this and my jaw dropped. Pretty amazing
         | detective work and a really amazing exploit. Presumably you
         | could run Doom on it :-).
         | 
         | Sometimes I feel like it's hopeless but my brain cannot help
         | but work on creating solutions to this sort of problem.
        
         | sterlind wrote:
         | absolutely brilliant, genius work.
         | 
         | I was confused about how they got the thing to run for an
         | unbounded amount of time, but I guess they probably have the
         | final operation at the end of a "processor cycle" be to
         | overwrite the next SegRef so that it loops back to the current
         | SegRef.
         | 
         | I'd love to see the thing in more detail - what the shellcode
         | looks like, how the CPU was designed, everything.
         | 
         | a scummy company but such transcendental brilliance..
        
         | MarkSweep wrote:
         | Stop weird machines!
         | 
         | http://langsec.org/occupy/
        
       | attack-surface wrote:
       | Noticed a flaw in my phone and other people's phones where the
       | default browser was not honored (on Android) and SMS links open
       | in `Samsung Internet` which barely gets updates and is a serious
       | vector for attack.
       | 
       | On top of this, why should a link containing a malicious payload
       | be able to speak to other parts of the system? Doesn't Android do
       | a basic security measure called sandboxing and `principle of
       | least privilege'[0]?
       | 
       | I am highly suspicious of every URL in my SMS messages app now
       | thanks to these NSO revelations. I'm not especially interesting,
       | so I doubt I had NSO-grade malware on my phone, but we need to
       | protect the masses, not just those with a high profile threat
       | model (Journalists, Dissidents, Activists, etc).
       | 
       | [0] https://en.wikipedia.org/wiki/Principle_of_least_privilege
        
         | olliej wrote:
         | Everything is sandboxed, part of the complexity of exploitation
         | is the circumvention of the sandbox.
         | 
         | The reason they create a virtual machine out of image
         | operations is because they have not even got direct code
         | execution at that point.
        
         | NikolaeVarius wrote:
         | Why did you create a brand new account for the sole reason of
         | posting a somewhat low information post.
        
           | attack-surface wrote:
           | Go easy on me, I'm new here. I plan to comment a lot more as
           | time goes by. My comment is purely anecdotal. I'm not saying
           | `everyone now has malware`, just stating that classes of
           | attacks can be killed by doing basic security like principle
           | of least privilege & sandboxing (Android and Apple probably
           | already do it, but then how are these attacks possible?)
        
         | blinkingled wrote:
         | It's all configurable on a per URL level on Android, it's just
         | hidden deep into settings - it's not so much that it wasn't
         | honored, it's likely someone some time set Samsung Internet top
         | open SMS links - you can go in the app settings/permissions/app
         | defaults to try and reset it or set it to another app.
        
       | yborg wrote:
       | Just imagine what they could do with a PSD file.
        
       | vmception wrote:
       | > further demonstrating that the capabilities NSO provides rival
       | those previously thought to be accessible to only a handful of
       | nation states
       | 
       | I mean the whole "nation state" or "nation state backed" hackers
       | thing was always a liiiiitle (very) ambiguous right?
       | 
       | Does the evidence really even move the goal post or mitigate the
       | convenient scapegoating?
       | 
       | Politicians and CEOs and certified IT professionals are all
       | incentivized to say "it was a nation state there's nothing we
       | could have done!" and rely on their sycophants to never question
       | it, instead of "we're incompetent and powerless towards random
       | teenagers who rented a rootkit before renting a compromised
       | windows machine that happened to be located in russia"
        
         | someotherperson wrote:
         | Blaming entire nations gives domestic justification for
         | retaliation. No point giving up a card when it's handed to you.
         | It is in a government's best interest to exploit every
         | opportunity handed to them -- it's less effort than fabricating
         | a reason when you need it later.
        
         | pen2l wrote:
         | I think it is worthwhile to distinguish the two, and I think
         | generally speaking it's the use of bespoke 0days that separates
         | nation state attackers from all others.
         | 
         | One can't really arrange the funding of computer
         | scientists/mathematicians working full-time on the thankless
         | job of finding vulnerabilities without nation-state kind of
         | money, as opposed to employing known vulnerabilities which
         | carry lesser chance of success and greater chance of blowback
         | in their execution.
         | 
         | Aftercall NSO is itself an IDF unit 8200 outfit.
        
           | vmception wrote:
           | So nations states as clients isnt the same as being state
           | sponsored or backed, a nation state as a former employer isnt
           | the same either
           | 
           | But ultimately I'm not sure the distinction matters if the
           | main result is that hackers get away unscathed and the
           | victims just deflect attention to the wrong targets
        
         | sangnoir wrote:
         | It's a useful distinction because it clarifies your threat
         | model: any attempts at security without a threat model is
         | hokum, IMO. It's good to know the limits of your security
         | stance by modeling how many resources your opponent can muster,
         | and how many _you_ can spare to defend yourself.
         | 
         | The resources required to develop these exploits (and mitigate
         | against them), were at least an order of magnitude above the
         | next tier, because there was very little sharing and reuse
         | (except among allies). Now, thanks to NSO, _any_ backwater
         | tinpot dictatorship that can 't provide reliable electricity or
         | offer a coherent policy for longer than a few months at a time
         | qualifies as a "nation-state" (i.e. hack _anyone_ in the
         | world), if they can spare a 6 or 7 digit budget to hire
         | exploits.
         | 
         | What NSO/HackingTeam and similar offensive security companies
         | did was to lower the bar on nation-state capabilities by
         | removing the need to develop a local program over many years,
         | and allowing the reuse of infrastructure, personnel and
         | exploits by countries that aren't allies. Call it a SpaceX for
         | hacking as opposed to space launches.
        
       | shmatt wrote:
       | NSO get way too much credit/dramatization these days. They are
       | mostly 2 things
       | 
       | * a shiny UI for customers
       | 
       | * a bank of 0-days
       | 
       | Those 0-days could be found in house, could be brought in from a
       | new employee copying a previous employer, or could simply be
       | purchased.
       | 
       | Most people in the IDF understand when a great security
       | researcher leaves 8200, the company they move to will probably
       | have some of their secrets, theres really no way to stop a 0day
       | from leaking from a researcher like that
       | 
       | This exploit has been closed, but we haven't heard anything about
       | Pegasus not working anymore, so i'm just assuming they moved on
       | to the next exploit. Previously there was a big Whatsapp exploit
       | FB closed that had them hurting. I'm sure they always have
       | multiple backups for when this happens
       | 
       | There is, and has always been, a 7 figure market for high quality
       | 0days. Hell, maybe its 8 figures these days. NSO is just "in your
       | face" which makes people angry
       | 
       | NSO was caught, and thats why Google is crediting them. But this
       | same exploit could have been heavily used by 8200/NSA/who knows
       | who else
        
         | vsareto wrote:
         | I think you get credit for having a bank of actual zero days,
         | self-discovered or not
         | 
         | Trying to trivialize the threat they pose only helps NSO
         | 
         | Plus, "willing to sell to nations with bad human rights
         | records" should be on that list
        
         | wolf550e wrote:
         | The researcher that leaves the military takes with them general
         | skills in reverse engineering and exploit development, but they
         | cannot use specific 0days they know about from their military
         | service. The specifics of everything done in the military is
         | classified. People told me they couldn't mention in job
         | interviews some of the skills they have because it's a secret.
         | Like, if someone developed this Turing complete architecture on
         | top of jbig2 decompression while they were in the military, it
         | would be considered a secret that cannot be revealed.
        
           | Closi wrote:
           | > They cannot use specific 0days they know about from their
           | military service
           | 
           | Of course they can, it is just illegal and might be classed
           | as treason or similar.
           | 
           | Remember we are talking about getting exploits for nation
           | states here rather than just some regular company - hiring
           | spies is part of standard operations for the intelligence
           | community and would be a valid zero-day acquisition strategy
           | (depending on the protection offered for NSO by Israel).
        
         | Jerrrry wrote:
         | >There is, and has always been, a 7 figure market for high
         | quality 0days. Hell, maybe its 8 figures these days.
         | 
         | popular social media account handles go for 4 figures.
         | 
         | people have wallets on their phones with 6+ figures in crypto
         | 
         | OSINT'ing a billionaires' phone number, leveraging a 0-click,
         | and you are looking at 8+ figure trade, personal, and national
         | secrets.
        
           | sangnoir wrote:
           | This has already allegedly happened to Bezos (attacked by
           | Saudi Arabia IIRC, which is an NSO customer). This was likely
           | over his ownership of Washington Post and the reporting on
           | the killing of Kashoggi.
           | 
           | Yeah, billionaires and Trillion-dollar company CxOs have to
           | step up their electronic security
        
             | Jerrrry wrote:
             | Bezos willingly gave his personal Watsapp number to a
             | Prince, just to "be in touch", and got hacked as a direct
             | result.
             | 
             | The Saudi's wanted leverage, gotten via Bezo's affair, but
             | the US cannot let (national security) leverage escape our
             | borders - and leaked his affair.
             | 
             | Shit is just lulz to me.
        
       | iamricks wrote:
       | Reading breakdowns like this gives me imposter syndrome
        
         | mark_mart wrote:
         | These people probably smartest developers in the world. I
         | wouldn't compare myself with them.
        
           | AlexanderTheGr8 wrote:
           | You think? These devs are _some_ of the devs in Israel. The
           | best get too popular to work in secret labs like NSO. I find
           | it hard to believe that the best devs are secret ones in
           | Israel. But obviously, I could be wrong.
        
       | john37386 wrote:
       | Am I reading this right? Google engineers are fixing apple
       | software?
        
         | vmception wrote:
         | yes, you are, and this isnt abnormal or require some form of
         | temporary altruism.
         | 
         | google is incentivized by ad space, not hardware sales. a large
         | portion of the users of google apps and search engine are using
         | apple hardware.
        
         | Jerry2 wrote:
         | > Google engineers are fixing apple software?
         | 
         | In this case, this was already fixed by Apple's engineers. And
         | like the article says, Citizen Lab (people who captured the
         | exploit in the wild) and Apple have shared the exploit with
         | Project Zero who analyzed it as well and wrote up that blog
         | post.
         | 
         | Project Zero people have found numerous bugs in Apple's
         | software in the past. They look at all kinds of software that's
         | written by all vendors.
        
         | olliej wrote:
         | You aren't reading it right :)
         | 
         | Although there's clearly bugs in the open source JBIG2 impl so
         | someone probably made fixes there as well?
        
         | SamuelAdams wrote:
         | Project Zero is a team of security analysts employed by Google
         | tasked with finding zero-day vulnerabilities.
         | 
         | https://en.wikipedia.org/wiki/Project_Zero?wprov=sfti1
         | 
         | Don't think of these folks as "google" employees. Think of them
         | as "really good hackers with corporate sponsorship". They look
         | for flaws in everything - windows, apple, Linux, and google
         | software. You should read some earlier blog posts, they're
         | really high quality.
        
           | ushakov wrote:
           | how does Google benefit from this?
        
             | rodgerd wrote:
             | The NSO are as much Google's enemy as Apple's.
        
             | codezero wrote:
             | Google employs a lot of people using Apple hardware.
        
             | RandallBrown wrote:
             | Google makes money when people use the Internet. By making
             | it safer to use the Internet, more people will use it and
             | Google will make more money.
        
             | derwiki wrote:
             | We're talking about them right now
        
               | ushakov wrote:
               | they're still evil though?
        
             | rwaksmunski wrote:
             | They are very often on the receiving end of state level
             | shenanigans. Finding bugs in software they use, helps them
             | stay secure. Not to mention the goodwill earned.
        
             | Juliate wrote:
             | Among others, what jumps to me: more stability on the
             | network and terminals (better for their business),
             | goodwill, attracting talent.
        
             | hn_throwaway_99 wrote:
             | A large percentage of the planet has personal sensitive
             | data stored by Google. If that data leaks, even due to a
             | bug in another company's product through which Google has
             | no fault, Google suffers. Google greatly benefits by having
             | a secure Internet.
        
               | netizen-936824 wrote:
               | On this note, has google ever had a breach? I actually
               | can't think of one off the top of my head, which is
               | impressive for a company like google with so much data
               | and such a large footprint
               | 
               | Either their security or PR is great (or both?)
        
               | rodgerd wrote:
               | > has google ever had a breach?
               | 
               | They've been completely breached by Chinese agencies in
               | the past, and IIRC the revelations in the Snowden leaks
               | prompted them to redo their entire internal networking
               | layout because of concerns about state-level spying.
               | 
               | On the Android front they keep tightening up access
               | (removing more power from root, more use of SELinux and
               | other controls) because of breaches in one form or
               | another.
        
               | sophacles wrote:
               | There was this one:
               | https://en.wikipedia.org/wiki/Operation_Aurora
               | 
               | It seems that the level of access gained could have been
               | used for a larger breach but fortunately the attackers
               | had different motives.
        
               | robocat wrote:
               | Google banned Windows throughout the organisation in 2010
               | due to this (with some well fenced exceptions where
               | Windows was unavoidable).
               | 
               | 1. Google will do costly things to be secure.
               | 
               | 2. At the time I did not hear of any other organisation
               | following Google's lead.
               | 
               | 3. They did not reverse the ban later.
        
               | [deleted]
        
               | helsinki wrote:
               | https://news.ycombinator.com/item?id=5982313
        
             | exikyut wrote:
             | Windows/macOS/Linux aren't the operating system any more,
             | the browser is.
             | 
             | And the browser's job is to be constantly online the whole
             | time and download and execute JavaScript that gets
             | dynamically optimized for your CPU architecture using one
             | of the fastest runtime compilers ever made (aNd WhiCh MiGhT
             | HaVe BuGs iN iT), and then your CPU directly, blindly
             | executes the result, with as little bounds-checking as the
             | runtime compiler thinks it can get away with so it runs as
             | fast as possible.
             | 
             | Zooming out somewhat, the new OS paradigm is the continuous
             | download and execution of absolutely arbitrary code, all
             | day, every day, from sources including hacked ad servers,
             | successful social engineering campaigns and your blog.
             | 
             | And Chrome has like ~70% market share.
             | 
             | Because public company and "legally bound to create value
             | for shareholders" and all that, it is very much in Google's
             | interest that they maintain that market share because that
             | lets them serve more ads.
             | 
             | So that's ultimately the reason. Google wants the world's
             | most secure platform so they can guarantee their ads
             | business.
        
       | sydthrowaway wrote:
       | NSO Group must employ some savants
        
       | newbamboo wrote:
       | Amazing apple let this slip past. Seems pretty obvious why this
       | is bad design, easy to exploit, etc. so maybe it was intentional
       | and already being used by us when the NSO group caught wind
       | through "back channels" and hopped on the gravy train.
        
         | hraedon wrote:
         | "iMessage's .gif handling was a bit sloppy" is a believable
         | problem; the idea that it was done deliberately to facilitate
         | access to what amounts to a VM running in an old image
         | compression format is a big stretch.
         | 
         | This isn't like goto fail, and even that one could be explained
         | by developer oversight.
        
       | ya3r wrote:
       | > Based on our research and findings, we assess this to be one of
       | the most technically sophisticated exploits we've ever seen,
       | further demonstrating that the capabilities NSO provides rival
       | those previously thought to be accessible to only a handful of
       | nation states.
       | 
       | > Using over 70,000 segment commands defining logical bit
       | operations, they define a small computer architecture with
       | features such as registers and a full 64-bit adder and comparator
       | which they use to search memory and perform arithmetic
       | operations. It's not as fast as Javascript, but it's
       | fundamentally computationally equivalent.
       | 
       | They create an emulated computer by decompressing an old image
       | format inside a PDF file which has a .gif extension! That is top
       | notch!
        
       | ridaj wrote:
       | ... or why your next design review should probably ask "is this
       | input format a Turing-complete language?"
       | 
       | This shows how un-theoretical that question is.
        
         | fooyc wrote:
         | "Is this a memory safe language" should be a critical question
         | for any external facing application, too
        
       | meibo wrote:
       | And still, in 2021, after so many exploits, realizing the
       | futility of trying to fix these bugs and adding their "blast
       | door" process, some Apple dev calls image parsing code where it
       | doesn't belong. The people that are supposed to maintain the
       | element of the OS that has been abused most by nation states do
       | not know the internal APIs they are working with, even just to
       | display looping GIFs.
       | 
       | This negligence is killing journalists and activists.
        
         | terhechte wrote:
         | How do we know this code was written in 2021? GIF support was
         | added to iMessage (I think) in 2016 or 2016; I couldn't find an
         | exact date.
        
       | sneak wrote:
       | > _Recently, however, it has been documented that NSO is offering
       | their clients zero-click exploitation technology, where even very
       | technically savvy targets who might not click a phishing link are
       | completely unaware they are being targeted. In the zero-click
       | scenario no user interaction is required. Meaning, the attacker
       | doesn 't need to send phishing messages; the exploit just works
       | silently in the background. Short of not using a device, there is
       | no way to prevent exploitation by a zero-click exploit; it's a
       | weapon against which there is no defense._
       | 
       | Having iMessage disabled and no SIM card in the phone (use an
       | external wifi vpn router with a sim) is a mitigation, and is one
       | that I use.
        
       | peanut_worm wrote:
       | This sounds like fiction, I can't even believe something like
       | that is possible
        
       | rwaksmunski wrote:
       | And NSO is the value option. Now imagine what nation states with
       | an actual budget have at their disposal.
        
         | cronix wrote:
         | It came out in the recent trial that the FBI couldn't open Kyle
         | Rittenhouse's iPhone, which was the latest generation at that
         | time last year.
        
           | oh_sigh wrote:
           | That might just be what the FBI wants you to think...
        
             | cronix wrote:
             | Of course that is possible, but they also released their
             | aerial infrared video of the event to the prosecution,
             | which was not previously known.
        
           | dogma1138 wrote:
           | The FBI couldn't mainly because they haven't caught up to
           | this level as it's not their primary objective they are first
           | and foremost and investigative outfit.
           | 
           | The NSA not to mention the entirety of the US defense
           | industry could've easily found a way to break the encryption
           | on a single device especially since they only had to break a
           | relatively simple password / passcode it's just a question of
           | how much would it cost and how long would it take.
        
         | pradn wrote:
         | It's still pretty expensive! NSO charged a flat $500,000 fee
         | for installing Pegasus. It charged government agencies $650,000
         | to spy on 10 iPhones; $650,000 for 10 Android users; $500,000
         | for five BlackBerry users; or $300,000 for five Symbian users.
        
           | krashidov wrote:
           | Feels weird that a private company can target individuals for
           | a price. How was this legal? Isn't it illegal to hack the
           | phone of a private individual? Or do they simply say here's
           | the tool, here's the manual, do what you want just don't tell
           | us?
        
             | dogma1138 wrote:
             | Phone companies charge governments to tap a phone line this
             | isn't that different with the only exception that phone
             | companies usually have to only follow requests made within
             | the country they operate in and those are usually backed by
             | a warrant.
             | 
             | Like with any complicated tech things are a bit more
             | involved since their exports are controlled under the same
             | regime as weapon exports do in Israel they likely have some
             | oversight to ensure that their tech does not leak out and
             | isn't used outside of the bounds of what was agreed on at
             | levels that go beyond NSO as a company itself.
             | 
             | These exports were very much part of the Israeli and quite
             | likely the US foreign policy.
             | 
             | Some deals like the one with KSA probably should never been
             | greenlit but many others unfortunately have had the outrage
             | steered away from the main culprits.
             | 
             | Amongst their exports they've also exported it to European
             | nations such as Poland.
             | 
             | Poland an EU and NATO member had used this software to have
             | one of its government agencies spy on a prosecutor in
             | charge of an investigation into some of the leading party's
             | members, however it didn't seem to generate as much outrage
             | and what little it had was directed as the NSO or Israel
             | which is laughable.
             | 
             | Poland isn't a state that normally could fall under any
             | arms embargoes or export restrictions.
             | 
             | This software had likely very little to do with Khashoggi's
             | fate, they didn't use it to lure him into a trap or to
             | track him for an assassination he was killed in an embassy
             | after being invited to come in, and he came in out of his
             | own free will.
             | 
             | I'm far more interested in how some of their western
             | clients have used this software and unfortunately so far no
             | one seems to want to pick or steer the story that way.
        
             | kube-system wrote:
             | Isreal classifies it as a weapon. In contrast to companies
             | that make guns and bombs, spyware seems mild by comparison.
        
               | rodgerd wrote:
               | Depends whether the spyware ends up with you being cut to
               | pieces with a hacksaw while a Saudi prince watches over a
               | teleconference link, I guess.
               | 
               | I'd rather be blown up.
        
             | sobkas wrote:
             | > Feels weird that a private company can target individuals
             | for a price. How was this legal? Isn't it illegal to hack
             | the phone of a private individual? Or do they simply say
             | here's the tool, here's the manual, do what you want just
             | don't tell us?
             | 
             | It's only illegal if you get caught. And then find someone
             | to prosecute you.
        
             | rodgerd wrote:
             | NSO have been trying to argue that they're shielded from
             | responsibility for their actions by being a de facto
             | extension of the state that they've sold to and therefore
             | enjoy sovereign immunity.
             | 
             | The collapse of that argument in the Facebook case is why
             | Apple are now suing as well.
        
         | bt1a wrote:
         | How can you be so sure NSO is not funded by nation state(s)? :)
        
         | Aperocky wrote:
         | The problem with nation states is that they don't pay people. I
         | don't think nation state can ever come up with something like
         | this - it takes passion, genius and those qualities demand
         | higher premiums than governments are ever willing to hand out.
        
           | addingnumbers wrote:
           | Their entire business model is predicated on nation-states
           | paying NSO more than NSO pays their employees.
        
             | Aperocky wrote:
             | nation states are willing to pay a LOT more for a contract,
             | they just don't want to pay people directly.
        
             | runeb wrote:
             | Yes but they're are paying for a proven exploit, not
             | sinking money into R&D
        
       ___________________________________________________________________
       (page generated 2021-12-15 23:00 UTC)