Spyware vendor Cytrox sold zero-day exploits to government-backed snoops who used them to deploy the firm’s Predator spyware in at least three campaigns in 2021, according to Google’s Threat Analysis Group (TAG).
Based on CitizenLab’s analysis of Predator spyware, Google’s bug hunters believe that the buyers of these exploits operate in Egypt, Armenia, Greece, Madagascar, Côte d’Ivoire, Serbia, Spain, Indonesia, and possibly other countries.
“We assess with high confidence that these exploits were packaged by a single commercial surveillance company, Cytrox, and sold to different government-backed actors who used them in at least the three campaigns,” Google security researchers Clement Lecigne and Christian Resell wrote in a TAG update this month.
Cytrox, which is based in the Balkan state of North Macedonia, did not respond to The Register‘s request for comment.
“Our findings underscore the extent to which commercial surveillance vendors have proliferated capabilities historically only used by governments with the technical expertise to develop and operationalize exploits,” the researchers wrote, adding that seven of the nine zero-day exploits that TAG discovered last year were developed by commercial vendors and sold to government-backed operators.
While NSO Group and its Pegasus spyware is perhaps the most notorious of these commercial providers, we’re told that TAG is tracking more than 30 such software providers that possess “varying levels of sophistication.” All of them are selling exploits or surveillance malware to governments for supposedly legitimate purposes.
The Predator campaigns were highly targeted to just tens of users hit, according to the Googlers. While the researchers didn’t provide specifics about who these campaigns targeted, they do note that they’ve seen this sort of tech used against journalists in the past. Similarly, CitizenLab’s analysis details Predator spyware being used against an exiled Egyptian politician and an Egyptian journalist.
Each of the TAG-discovered campaigns delivered a one-time link via email that spoofed URL shortening services. Once clicked, these URLs directed the victims to an attacker-owned domain that delivered Alien, Android malware that loads the Predator spyware and performs operations for it.
“Alien lives inside multiple privileged processes and receives commands from Predator over IPC,” Lecigne and Resell noted. “These commands include recording audio, adding CA certificates, and hiding apps.”
The first campaign, which TAG detected in August 2021, used a Chrome vuln on Samsung Galaxy S21 devices. Opening the emailed link in Chrome triggered a logic flaw in the browser that forced the Samsung-supplied browser to open another URL. The content at that other URL likely exploited flaws in the Samsung browser to fetch and run Alien.
The security researchers surmise that the attackers didn’t have exploits for the then-current version of Chrome (91.0.4472) and instead used n-day exploits against Samsung Browser, which was running an older version of Chromium.
“We assess with high confidence this vulnerability was sold by an exploit broker and probably abused by more than one surveillance vendor,” they wrote.
The second campaign, which TAG observed in September 2021, chained two exploits: an initial remote code execution and then a sandbox escape. It targeted an up-to-date Samsung Galaxy S10 running the latest version of Chrome.
“After escaping the sandbox, the exploit downloaded another exploit in /data/data/com.android.chrome/p.so to elevate privileges and install the Alien implant,” according to Lecigne and Resell, adding that they haven’t retrieved a copy of the exploit.
TAG analyzed one other campaign, a full Android exploit chain, targeting an up-to-date Samsung phone running the latest version of Chrome. It included a zero-day in JSON.stringify and a sandbox escape, which used a Linux kernel bug in the epoll() system call to gain sufficient privileges to hijack the device.
This particular Linux kernel bug, CVE-2021-1048, was fixed more than a year before the campaign. However, the commit was not flagged as a security issue, so the update wasn’t backported to most Android kernels. All Samsung kernels remained vulnerable when the nation-state backed gangs carried out this exploit. ®
Swansea City Council has been forced to extend an IT service provider contract to keep its unsupported and unpatched ERP system up and running because its replacement is running two years behind.
A procurement document published last week shows Infosys was awarded £2 million contract (c $2.40 million) extension, until 30 November 2023, to support the Welsh council’s Oracle eBusiness Suite ERP system while it waits for the replacement Oracle Fusion system to be ready. It takes Infosys’s total for supporting the old system to £6.7 million (c $8.1 million).
Council risked failing its Public Service Network accreditation: report
It said using unsupported software “increased the risk of cyber-attacks and potential data theft” while there was also “a risk payroll may not function, staff and pensioners may not be paid.” The report also said the council risked failing its Public Service Network (PSN) accreditation, which meant it could be prevented from sharing data with the health service, police, and the Department for Work and Pensions (DWP).
However, in March 2020, the council invoked a force majeure clause – which alters parties’ contractual obligations – with the support provider Infosys and began discussions to resume the program.
It opted to suspend the program and start back up in February 2021, with the aim to go live in October 2021. The plans said Infosys had agreed to absorb additional costs for this extension.
It said Oracle had agreed to extend support from November 2020 to 2022 so it could get regular updates and patches. “Although this risk still exists, it has been mitigated,” it said.
Given the council has awarded a contract well after the planned go-live of its replacement, it seems those assumptions are under threat. The council has so far failed to respond to The Register‘s request for comment.
Its Fusion project might provide some lessons for the London Borough of Waltham Forest, which plans to have its core solution – a move away from an ageing SAP ERP system – live within a year of the project’s start.
Sony aims to boost the ‘growth of gaming culture’ with two 27-inch monitors and three headsets, designed for both PC and Playstation gamers.
Sony has announced a batch of new monitors and headsets with a focus on PC gamers, as the company looks to reach out to more than its core Playstation audience.
The Inzone range consists of two 27-inch monitors and three headsets, which are all designed to enhance a gamer’s experience. While the main target appears to be PC gamers, the products have features that suit PS5 users.
Sony said its Inzone M9 monitor has 4K resolution and a high contrast with full array local dimming, designed to boost the detail of gaming scenes in deep black and brightness. The monitor also has a 144Hz refresh rate, an IPS display and a 1ms response time. Sony said the monitor will help lead to quicker reactions, which is a clear benefit for competitive PC gamers.
Meanwhile, the M3 monitor will have a 240Hz refresh rate, along with variable refresh rate technology to help gamers “capture movements of rivals in shooter games”.
To go with the monitors, Sony is releasing two wireless headsets, along with the wired Inzone H3 model. The Inzone H9 will have 32 hours of battery life, while the H7 model will have 40 hours.
Speaking on the products, Sony’s head of game business and marketing office Yukihiro Kitajima said there has been a higher interest in gaming with the spread of e-sports tournaments and the advancement of gaming entertainment.
“With Sony’s strong history of high-end audio and visual technology products, we believe this new line will offer even more options for those looking to upgrade their current gaming systems,” Kitajima said.
“We are committed to contributing to the growth of gaming culture by providing PC and PlayStation gamers with a wider range of options to enrich lives through gaming.”
The Inzone headsets range from €300 to €100 and are expected to launch in July, while the M9 monitor is due to launch in the Summer at a cost of €1099. Sony said the pricing and availability of the M3 monitor is expected to be revealed sometime this year.
10 things you need to know direct to your inbox every weekday. Sign up for the Daily Brief, Silicon Republic’s digest of essential sci-tech news.
Many American womenin recent days have deleted period tracking apps from their cellphones, amid fears the data collected by the apps could be used against them in future criminal cases in states where abortion has become illegal.
The trend already started last month when a draft supreme court opinion that suggested the court was set to overturn Roe v Wade was leaked, and has only intensified since the court on Friday revoked the federal right to abortion.
These concerns are not baseless. As with various other apps, cycle trackers collect, retain and at times share some of their users’ data.In a state where abortion is a crime, prosecutors could request information collected bythese apps when building a case against someone. “If they are trying to prosecute a woman for getting an illegal abortion, they can subpoena any app on their device, including period trackers,” said Sara Spector, a Texas-based criminal defense attorney, and ex-prosecutor.
Cycle trackers are popular for a reason. Nearly a third of American women have been using them, according to a 2019 survey published by the Kaiser Family Foundation. They have helped make women’s lives easier in many ways, from family planning and detecting early signs of health issues to choosing the perfect time for a holiday.
A 2019 study published in the British Medical Journal (BMJ) found that 79% of health apps available through the Google Play storethat were related to medicine, including apps that help manage drugs, adherence, medicines, or prescribing information, regularly shared user data and were “far from transparent”. But many of the big players have made progress over the past years.
Two of the most popular period trackers in the US, Flo and Clue, have more than 55 million users combined. The Berlin-based app Clue said it was “committed to protecting” users’ private health data and that it was operating under strict European GDPR laws. The company’s website says the app collects device data, event and usage data, in addition to a user’s IP address, health and sensitive data it may use for the purpose of improving the app, the services, and preventing abusive use of its service. But Clue does not track users’ precise location, and says it does not store sensitive personal data without a user’s explicit permission. The company also tweeted that it would have a “primary legal duty under European law” not to disclose any private health data and it would “not respond to any disclosure request or attempted subpoena of their users’ health data by US authorities”.
But just because data is being processed by a European company, doesn’t mean that it is entirely immune from US prosecution, said Lucie Audibert, a lawyer at Privacy International, a global NGO that researches, litigates and advocates against abuses of technology and data by governments and corporations.
“The fact that GDPR applies is not that relevant in this case. When it comes to a legitimate legal request from US authorities European companies usually comply. Also, a European company may be hosting data outside the EU, making it subject to different legal frameworks and cross-border agreements,” Audibert added. She also stressed that using a Europe-based app won’t protect women from the courts requesting data from them directly. But it can be a slightly better option than using a US-based one because US companies are more easily compelled to comply with American authorities and courts’ requests. Enforcement is more difficult against European ones.
On Friday, Flo announced that it will soon be launching an “Anonymous mode” that can help keep users’ data safe in any circumstances.
The company did not respond to a request for comment.
Stardust did not immediately respond to a request for comment.
Planned Parenthood encourages people to use their app Spot On. “People who want to track their periods and birth control always have the option to remain anonymous by using the Spot On app without creating an account,” the organization said in a statement.“This way, period or birth control data is only saved locally to a person’s phone and can be deleted at any time by deleting the app.”
Third-party apps are not the only option when it comes to period trackers. Apple has a built-in cycle tracker in its Health app that offers more privacy than most external apps. With just a few steps, one can turn off the storing of their health data in iCloud, and it also has the option to store the encrypted data on their computer or phone.
Evan Greer, deputy director of the non-profit advocacy group Fight for the Future, saidthe best way to protect sensitive health data was to only use apps that store data locally rather than in the cloud. “Because any app where a company [that could receive a subpoena] has access to their users’ data could make it vulnerable for a legal request.”
Eva Blum-Dumontet, a tech policy consultant, said, “It is normal that in times of concern, people are looking differently at technology and apps that we trusted.
“I think when there is a discourse around whether women should delete these apps, we have to think about why they use them in the first place,” Blum-Dumontet said. “These trackers help them manage menstrual cycle when they are experiencing pain.”
Blum-Dumontet stressed that instead of asking users to change their behaviors, “it is period trackers that should change their practices”.
“They should never have owned so much data in the first place. If they adopted practices like storing data locally and minimizing the data to what’s strictly necessary we wouldn’t be having this debate now. It’s not too late for them to do the right thing,” she said.
Melissa, a 27-year-old mother from Texas who is goingby only her first name to not jeopardize her employment, said she deleted the app because she fears that when she travels, her state could use her missed period data against her.
“I will miss using the app so much. I have used it for so many things, like tracking my ovulation or predicting my mood changes. Sometimes I wake up feeling irritable, and I don’t know why until my app tells me that this could be normal at this point of my cycle,” she added. Melissa also says she would have loved to use it for future conceptions, but now she can’t.
Although much of the warnings on Friday were focused on just period trackers these are not the only apps that can be used against users when it comes to criminal prosecution,experts warned.
“Google Maps or a random game on your phone could just as easily be weaponized against someone as a menstrual tracking app,” Greer said. “While we need to educate each other and take precautions, it’s not OK to put the responsibility solely on individuals. Companies and lawmakers need to act immediately to protect people.”
The concerns over period tracking data are part of a broader conversation about the amount of personal information smartphones collect. Women’s rights organizations all over the world are warning users to be more mindful of their digital presence, not just when it comes to period trackers.
Cycle tracking apps can be hugely useful for many women, said Jonathan Lord, UK medical director for MSI Reproductive Choices. “But all data can be used against you.”
According to Lord, this danger will remain until “we treat abortion like all other healthcare – regulated like all other medical procedures, but not criminalized”.