April 23, 2020

iOS Mail Exploit

Lookout Recommendation for Admins

At the point of publication, the initial vulnerability in Mail has only been patched in the beta release of iOS 13.4.5 and has not yet been distributed in the general software update. In order to be protected from this exploit, users should not be logged into the native Apple Mail app on their iOS devices and leverage other platforms for email.

In order to install spyware/surveillanceware, the attacker needs to accomplish a device compromise. Lookout’s advanced device compromise detection will detect and alert on the device itself as well as in the MES console.

Overview

Recently, news broke of attacks exploiting two iOS vulnerabilities, which have existed since at least 2012. Both vulnerabilities affect the iOS MIME library and can be exploited via emails received by the iOS Mail app. The first vulnerability is an out-of-bounds write caused by a failure to correctly handle an error condition while the second vuln is a heap buffer overflow.

The attacks exploiting these vulnerabilities appear to have been used to target particular high-value individuals and corporations around the world, likely with the goal of surveillance / spying, but have not yet been attributed to a particular group of malicious actors.

How Does it Work?

The primary exploit involves a specially crafted email message sent to the target’s email address. On iOS 12, the target has to open the email to activate the exploit chain. However, on iOS 13, the target never even has to open the message and it can be executed with zero touch as soon as the message is downloaded to the device by maild.

In both scenarios, the victim wouldn’t notice any abnormal behavior aside from the Mail app crashing or some emails missing, as the attackers seem to delete the original email as part of their cover-up tactics. In isolation, these exploits do not give the attacker control over the target device - another exploit targeting a kernel vulnerability is needed to allow the attacker to gain privileged access.

Authors

Lookout

Cloud & Endpoint Security

Lookout is a cybersecurity company that makes it possible for tens of millions of individuals, enterprises and government agencies to be both mobile and secure. Powered by a dataset of virtually all the mobile code in the world -- 40 million apps and counting -- the Lookout Security Cloud can identify connections that would otherwise go unseen and predict and stop mobile attacks before they do harm. The world’s leading mobile network operators, including AT&T, Deutsche Telekom, EE, KDDI, Orange, Sprint, T-Mobile and Telstra, have selected Lookout as its preferred mobile security solution. Lookout is also partnered with such enterprise leaders as AirWatch, Ingram Micro, Microsoft, and MobileIron. Headquartered in San Francisco, Lookout has offices in Amsterdam, Boston, London, Sydney, Tokyo, Toronto and Washington, D.C.

Entry Type
Threat Guidances
Platform(s) Affected
iOS
Threat Type
Vulnerability
Platform(s) Affected
Threat Guidances
iOS
Vulnerability

Stop Cyberattacks Before They Start With Industry-Leading Threat Intelligence.

HeaderHeaderHeaderHeader
CellCellCellCell
CellCellCellCell
CellCellCellCell
CellCellCellCell