Russia says it uncovered U.S. operation to compromise Apple phones

Apple iPhoneRUSSIAN OFFICIALS SAID THEY uncovered a sophisticated espionage effort by the United States government, which targeted the smartphones of thousands of Apple users living in Russia, including foreign diplomats. According to the Russians, the operation was carried out by the National Security Agency (NSA), an American intelligence agency that specializes in gathering foreign signals intelligence and securing the United States government’s information and communication systems.

The source of the allegation is the Federal Security Service (FSB), Russia’s primary counterterrorism and counterintelligence agency. On Thursday, the FSB said that “an intelligence action of the American special services” had been uncovered by FSB officers with the assistance of the Federal Protective Service. Known in Russia by its initials, FSO, the Federal Protective Service operates federal emergency communications systems and provides personal security for high-ranking government officials.

According to the FSB, “several thousand Apple telephones” were targeted in the alleged NSA operation, including devices belonging to “domestic Russian subscribers”, as well as devices belonging to foreign diplomats stationed in Russia. The latter allegedly include diplomats from Israel, Syria and China, according to the FSB. The Russian agency also claimed that Russia-based foreign diplomats from North Atlantic Treaty Organization member-states had their phones targeted, as well as diplomats from former Soviet states.

In the same press release, the FSB accused the NSA and Apple of working in “close cooperation” with each other —an allegation that the Russian government has been making for several years. In a follow-up media statement, the Russian Ministry of Foreign Affairs accused the United States of engaging in “hidden data collection” and dismissed Apple iPhones as “absolutely transparent”.

Kremlin spokesman Dmitry Peskov urged Russians to avoid using Apple products and lamented reports that one in three Russian government workers continue to utilize Apple products for their personal use. When asked by reporters if the Russian government had plans to outlaw the use of Apple products by government employees, Peskov responded that the Kremlin did “not have the power to even recommend that”, except for those government employees with access to classified information.

Author: Joseph Fitsanakis | Date: 02 June 2023 | Permalink

Catalan pro-independence leader’s phone hacked using Israeli spy software

Roger TorrentThe personal smartphones of leading Catalan pro-independence politicians were hacked using a highly invasive software built by a controversial Israeli firm, according to an investigative report by two newspapers. The revelation is likely to reignite a tense row between Madrid and pro-independence activists in one of the country’s wealthiest regions, which led to a major political crisis in 2017.

An estimated 50 percent of the population of the autonomous Spanish region of Catalonia wishes to secede from Spain. However, Madrid refused to recognize the legitimacy of an independence referendum organized by secessionist activists in 2017. The stalemate led to massive protests throughout the country, which were marred by violence and thousands of arrests, as Spain faced its deepest political crisis since the 1970s. In response to the protests, the central government suspended Catalonia’s autonomous status and arrested many of the independent movement’s leaders. Many of them have been given lengthy jail terms, while others remain abroad and are wanted by the Spanish government for promoting insurrection.

On Monday, British newspaper The Guardian and Spanish newspaper El País revealed the results of a joint investigation, according to which the smartphones of senior Catalan pro-independence politicians were targeted by hackers in 2019, and possibly even earlier. Among them was Roger Torrent, who serves as the speaker of the Parliament of Catalonia. The newspapers said he had been alerted to the hacking by cybersecurity employees of WhatsApp, a Facebook-owned company whose application was allegedly used by the hackers to take control of Torrent’s phone.

The software that was allegedly used to hack the Catalan politicians’ phones was Pegasus. It was built by NSO Group, an Israeli software development company that specializes in surveillance technologies. According to WhatsApp, which sued NSO Group in 2019, NSO Group specifically developed the Pegasus hacking platform to enable its users to exploit flaws in WhatsApp’s servers and to gain access to the telephone devices of targeted individuals. Pegasus allegedly allows its users to covertly operate a compromised phone’s camera and microphone. Read more of this post

Most government hackers now target cell phones, not computers, experts say

Cell Phone - IAThe majority of government-sponsored hacking now targets cell phones, not personal computers, according to researchers who say that political dissidents are especially targeted by totalitarian regimes around the world. Until 2015, most government-sponsored hacking operations were directed against the personal computers of targeted individuals. However, experts tell The Wall Street Journal that as of this year cell phones have become a far more lucrative target than personal computers in government-sponsored hacking operations. Researchers with Lookout Mobile Security, a security software company based in the United States, say that detected phone-hacking operations that are believed to be sponsored by governments have increased by a factor of 10 in the first five months of this year, compared to 2015.

According to Lookout, the increase in hacking operations targeting mobile phones reflects the proliferation of smartphone usage around the world, as well as the increase in consumption of cell phone software. Government-sponsored hackers usually compromise their targets’ cell phones through malicious software disguised as cell phone applications. The Wall Street Journal also reports that the software needed to build malicious software for cell phones has become cheaper and more readily available. Compromising a target’s cell phone provides hackers with information that is far more personal and sensitive than what can be found on a personal computer. The paper quotes Mike Murray, Lookout’s vice president of security research, who says: “It is one thing to compromise someone’s computer. It’s another thing to have a listening device that they carry around with them 24 hours a day”. Compromised phones become immensely powerful espionage tools, explains Murray.

Many of the individuals whose cell phones are targeted by governments are activists or dissidents who campaign for political or economic reforms in their countries. Their cell phones are targeted in systematic hacking campaigns by countries like Ethiopia, the United Arab Emirates, Cambodia, and Mexico, said Lookout. The Wall Street Journal cites Raj Samani, chief scientist for the antivirus firm McAfee, who claims that nearly 11 percent of cell phones worldwide were infected with some kind of malware in 2017. That statistic is likely to rise significantly by the end of 2018, says Samani.

Author: Ian Allen | Date: 08 June 2018 | Permalink

Trump chief of staff’s phone was breached for nearly a year, say sources

John KellyThe personal cell phone of the White House Chief of Staff John Kelly (photo) was compromised by persons unknown and may have been bugged for nearly a year, according to United States government officials. General Kelly retired from the US Marine Corps in 2016, after serving as chief of the US Pentagon’s Southern Command, where he supervised American military operations in Latin America and the Caribbean. Soon afterwards, he was appointed by US President Donald Trump to lead the Department of Homeland Security, which he joined in January of 2017. Six months later, however, he replaced Reince Priebus, who resigned abruptly from the post of White House Chief of Staff, citing differences over management style with the Trump administration.

According to the online news outlet Politico, the breach of Kelly’s personal phone was discovered last summer, after the retired general sought the advice of the White House’s technical support staff. Kelly told the technical experts that his phone’s operating system had been malfunctioning for several months and that software updates seemed to make the problem worse. Once the breach was discovered, White House staff summarized the findings of the probe into Kelly’s phone in a one-page memorandum. Three people who read the document spoke anonymously to Politico. The news outlet said that, according to the White House memorandum, it is unclear how and when Kelly’s phone was breached. There is also no information in the document about how much and what kind of information was compromised throughout the duration of the breach. Politico cited a White House spokesman who claimed that the chief of staff used his personal phone sparsely and never for government business.

However, depending on the level of the breach, hackers could have used the compromised phone to listen in to Kelly’s private conversations —in and out of the White House— even when the phone was not in use but simply turned on. It follows that if the breach of Kelly’s phone was orchestrated by a foreign government, the magnitude of the compromise may be substantial. Politico reports that digital forensics experts are now reviewing Kelly’s travels in the past year, as part of a widening investigation into the breach. Meanwhile, the general has been issued a new phone for his personal use.

Author: Joseph Fitsanakis | Date: 10 October 2017 | Permalink

China hacking Hong Kong protesters’ smartphones, says security firm

Hong Kong protestersBy IAN ALLEN | intelNews.org
A mobile telephone security company has said the government of China is probably behind a sophisticated malware designed to compromise the smartphones of protesters in Hong Kong. Ever since the Hong Kong ‘umbrella revolution’ began to unfold, countless reports have referred to the use of smartphone applications as organizing tools by the protesters. According to one account, an application called FireChat was downloaded by more than 100,000 smartphone users in Hong Kong in less than 24 hours. FireChat is said to allow protesters to continue communicating with each other even when their individual devices are unable to connect to a mobile network. But a California-based mobile telephone security firm has warned that the Chinese government could be using such enabling applications to compromise the smartphones of pro-democracy protesters in the former British colony. Lacoon Mobile Security, which specializes in assessing and mitigating mobile security threats, said on Tuesday that it had detected several types of malware camouflaged as mobile phone applications designed to help the protesters organize. In a statement posted on its website, the security firm said that, once downloaded by a smartphone user, the malware gives an outsider access to the address book, communication logs and other private data stored on the unsuspecting user’s device. Lacoon added that what made the malware unusual was that it came in two different versions; one appears to target smartphones that run Apple’s iOS operating system, while the other is designed to compromise phones using Google’s Android software. The company noted that the types of malware that are circulating among Hong Kong protesters were some of the most sophisticated it had ever seen. They made use of a method called mRAT, which stands for multidimensional requirements analysis tool. Among other things, mRAT allows a hacker to take surreptitious pictures using the phone camera of a compromised smartphone. According to Lacoon, the design of the malware in question is so advanced that it is “undoubtedly backed by a nation state”. Read more of this post

News you may have missed #857 (hacking edition)

Mossad sealBy IAN ALLEN | intelNews.org
►►UK spies hacked Belgian phone company using fake LinkedIn page. British spies hacked into the routers and networks of a Belgian telecommunications company Belgacom by tricking its telecom engineers into clicking on malicious LinkedIn and Slashdot pages, according to documents released by NSA whistleblower Edward Snowden. The primary aim, reports the German newsmagazine Der Spiegel, which obtained the documents, was to compromise the GRX router system that BICS controlled, in order to intercept mobile phone traffic that got transmitted by the router.
►►Indonesian hackers behind attack on Australian spy service website. Indonesian hackers are believed to have brought down the website of the Australian Secret Intelligence Service, Australia’s leading spy agency. The page was not working on Monday afternoon after hackers launched a “denial of service” attack. A “404 not found” message typically appears when a website crashes under a “denial of service” attack. The cyber attack is reportedly a response to revelations that Australia had been spying on its closest neighbor through its Jakarta embassy.
►►Hamas blasts alleged Mossad website. Hamas officials released a warning about a website called Holol (“solutions”), claiming it is a ruse set up by Israel’s Mossad intelligence agency to recruit Gazans as informants. The website’s “Employment” page states, “due to our connections with the Israeli Civil Administration, we can help you bypass the bureaucratic tape and procedural processes which prevent you from leaving Gaza”. The site also offers Israeli medical assistance, “due to connections with the Ministry of Health and the Israeli Civil Administration”. Palestinians interested in contacting the website’s officials are asked to provide their full name, telephone number, email, topic of inquiry, and an explanation of why they are asking for help. Last month, Lebanese group Hezbollah accused the Mossad of being behind a website seeking information on Hezbollah’s intelligence wing.

Leaked documents show capabilities of new surveillance technologies

Net Optics logo

Net Optics logo

By JOSEPH FITSANAKIS | intelNews.org |
A trove of hundreds of documents, obtained by participants in a secretive surveillance conference, displays in unprecedented detail the extent of monitoring technologies used by governments around the world. The Wall Street Journal, which obtained the leaked documents, says they number in the hundreds; they were reportedly authored by 36 different private companies that specialize in supplying government agencies with the latest surveillance hardware and software. They were among dozens of vendors that participated in an unnamed conference near Washington, DC, in October, which attracted interested buyers from numerous government agencies in America and beyond. The Journal, which has uploaded scanned copies of the leaked documents, says that many include descriptions of computer hacking tools. The latter enable government agencies to break into targeted computers and access data stored in hard drives, as well as log keystrokes by the targeted computers’ users. Other applications target cellular telecommunications, especially the latest models of so-called ‘smartphones’; one vendor in particular, Vupen Security, gave a presentation at the conference, which describes how its products allow for electronic surveillance of cell phones by exploiting security holes unknown to manufacturers. Some of the most popular products at the conference related to what the industry calls “massive intercept” monitoring, namely large-scale software systems designed to siphon vast amounts of telephonic or email communications data, or to capture all Internet exchanges taking place within a country’s computer network. One conference participant, California-based Net Optics Inc., bragged in its presentation about having enabled “a major mobile operator in China” to conduct “real-time monitoring” of all cell phone [and] Internet content on its network. The stated goal of the surveillance was to “analyze criminal activity” and “detect and filter undesirable content”. Read more of this post

News you may have missed #546

Thomas Drake

Thomas Drake

By IAN ALLEN | intelNews.org |
►►Whistleblower says NSA mismanagement continues. Former US National Security Agency employee Thomas Drake was recently sentenced to a year’s probation for leaking secrets about the agency to a journalist. The presiding judge did not sentence him to prison, recognizing that his genuine intention was to expose mismanagement. Soon after his sentencing, Drake told The Washington Times that mismanagement continues at the NSA, which he compared to “the Enron of the intelligence world”. He also told the paper that NSA’s accounts were “unauditable”, like those of most of the other agencies operating under the Pentagon. ►►Taliban claim phones hacked by NATO. The Afghan Taliban have accused NATO and the CIA of hacking pro-Taliban websites, as well as personal email accounts and cell phones belonging to Taliban leaders, in order to send out a false message saying that their leader, Mullah Mohammad Omar, had died. Taliban spokesman Zabihullah Mujahid told the Reuters news agency that the hacking was “the work of American intelligence” and that the Taliban would “take revenge on the telephone network providers”. ►►Rumsfeld memo says ‘US can’t keep a secret’. “The United States Government is incapable of keeping a secret”. This was opined in a November 2, 2005 memo authored by Donald Rumsfeld. The memo by the then-Defense Secretary continues: Read more of this post

Phone hacking ring helped groups evade eavesdroppers

By JOSEPH FITSANAKIS | intelNews.org |
Even though computer hacking tends to monopolize information security headlines, phone hacking, or phreaking, as it is technically known, remains a major source of headache for communications security professionals. Last Friday, law enforcement agencies in several countries announced the arrest of more than half a dozen individuals in the US, Italy and the Philippines, who were operating a major international phreaking network. The group had apparently broken into thousands of corporate telephone networks in Australia, Canada, the US, and Europe, and was channeling near-free telecommunications services to several criminal and militant organizations around the world. According to law enforcement insiders, “the hacked networks might have been used by terrorist organizations to thwart eavesdropping and tracking by intelligence agencies”. Read more of this post