美国政府的iPhone黑客工具包现在落入外国间谍和罪犯手中。
Possible US Government iPhone-Hacking Toolkit in foreign spy and criminal hands

原始链接: https://www.wired.com/story/coruna-iphone-hacking-toolkit-us-government/

谷歌和 iVerify 发现了一个名为“科鲁尼亚”(Coruna)的复杂黑客工具包,该工具包可能源自美国政府技术,现被用于网络犯罪和疑似俄罗斯间谍活动。科鲁尼亚利用苹果 Webkit 浏览器引擎中的漏洞,影响 iOS 13-17.2.1 版本(已在 iOS 17.3 中修复),主要针对 Safari 用户。它会避开启用了苹果“锁定模式”的设备。 iVerify 估计约有 42,000 台设备在牟利活动中被攻陷,潜在感染可能通过恶意网站扩展到乌克兰公民。该工具包的核心代码非常完善,表明由一位高度熟练的作者编写。然而,用于窃取加密货币和数据的附加恶意软件实现得比较粗糙,表明是在获得核心工具包*之后*才被网络罪犯添加的。 起源尚不清楚,但专家认为零日漏洞经纪人——那些向出价最高者出售黑客工具的人——可能促成了其传播,类似于最近美国承包商因向俄罗斯出售工具而被判刑的案例。一旦发布,控制这项技术几乎是不可能的,因为“潘多拉的盒子已经打开”。

黑客新闻 新 | 过去 | 评论 | 提问 | 展示 | 招聘 | 提交 登录 美国政府的iPhone黑客工具包现在已落入外国间谍和罪犯手中 (wired.com) 27点 由 alwillis 1小时前 | 隐藏 | 过去 | 收藏 | 1条评论 帮助 theearling 9分钟前 [–] 好像美国自己不是间谍和罪犯一样… 奇怪的标题 回复 指南 | 常见问题 | 列表 | API | 安全 | 法律 | 申请YC | 联系 搜索:
相关文章

原文

Google notes that Apple patched vulnerabilities used by Coruna in the latest versions of its mobile operating system, iOS 26, so its exploitation techniques are only confirmed to work against iOS 13 through 17.2.1. It targets vulnerabilities in Apple's Webkit framework for browsers, so Safari users on those older versions of iOS would be vulnerable, but there's no confirmed techniques in the toolkit for targeting Chrome users. Google also notes that Coruna checks if an iOS devices has Apple's most stringent security setting, known as Lockdown Mode, enabled, and doesn’t attempt to hack it if so.

Despite those limitations, iVerify says Coruna likely infected tens of thousands of phones. The company consulted with a partner that has access to network traffic and counted visits to a command-and-control server for the cybercriminal version of Coruna infecting Chinese-language websites. The volume of those connections suggest, iVerify says, that roughly 42,000 devices may have already been hacked with the toolkit in the for-profit campaign alone.

Just how many other victims Coruna may have hit, including Ukrainians who visited websites infected with the code by the suspected Russian espionage operation, remains unclear. Google declined to comment beyond its published report. Apple did not immediately provide comment on Google or iVerify's findings.

A Single, Very Professional Author

In iVerify's analysis of the cybercriminal version of Coruna—it didn't have access to any of the earlier versions—the company found that the code appeared to have been altered to plant malware on target devices designed to drain cryptocurrency from crypto wallets as well as steal photos and, in some cases, emails. Those additions, however, were “poorly written” compared to the underlying Coruna toolkit, according to iVerify chief product officer Spencer Parker, which he found to be impressively polished and modular.

“My God, these things are very professionally written,” Parker says of the exploits included in Coruna, suggesting that the cruder malware was added by the cybercriminals who later obtained that code.

As for the code modules that suggest Coruna’s origins as a US government toolkit, iVerify’s Cole notes one alternative explanation: It's possible that the overlaps between Coruna's code and the Operation Triangulation malware, which Russia pinned on US hackers, could have resulted from Triangulation’s components being picked up and repurposed after they were discovered. But Cole argues that’s unlikely. Many components of Coruna have never been seen before, he points out, and the whole toolkit appears to have been created by a “single author,” as he puts it.

“The framework holds together very well,” says Cole, who previously worked at the NSA, but notes that he's been out of the government for more than a decade and isn't basing any findings on his own outdated knowledge of US hacking tools. “It looks like it was written as a whole. It doesn’t look like it was pieced together.”

If Coruna is, in fact, a US hacking toolkit gone rogue, just how it got into foreign and criminal hands remains a mystery. But Cole points to the industry of brokers that may pay tens of millions of dollars for zero-day hacking techniques that they can resell for espionage, cybercrime, or cyberwar. Notably, Peter Williams, an executive of US government contractor Trenchant, was sentenced this month to seven years in prison for selling hacking tools to the Russian zero-day broker Operation Zero from 2022 to 2025. Williams’ sentencing memo notes that Trenchant sold hacking tools to the US intelligence community as well as others in the “Five Eyes” group of English-speaking governments—the US, UK, Australia, Canada and New Zealand—though it's not clear what specific tools he sold or what devices they targeted.

“These zero-day and exploit brokers tend to be unscrupulous," says Cole. “They sell to the highest bidder and they double dip. Many don’t have exclusivity arrangements. That’s very likely what happened here.”

“One of these tools ended up in the hands of a non-Western exploit broker, and they sold it to whoever was willing to pay,” Cole concludes. “The genie is out of the bottle.”

联系我们 contact @ memedata.com