From the article:Is this historical? why arent the recent version or iOS18 mentioned?
The exploits work on iOS versions 13 to iOS 17.2.1. Versions beyond 17.2.1 aren’t vulnerable. The exploits also don’t fire when Apple Lockdown is activated or a browser is set to private browsing.
Yeah I'm... sort of at a loss as to why stuff patched in 2023 is newsworthy. Is this particular set of exploits unique? Is the fact that CISA is issuing a notice unusual? (I mean I guess under current DHS it might be unusual for CISA to do anything at all, but still.)Is this historical? why arent the recent version or iOS18 mentioned?
I guess Private Browsing is different than opening an Incognito window in Firefox?From the article:
It's an article about 2nd-hand zero-days. Once a software company publishes that they've fixed a zero-day, most people probably expect that hackers would move on from using it, since it's patched. My interpretation is that this shows that hackers may be developing the hacks after the zero-day has been patched and details are available with the intent/knowledge that not everyone will be up to date immediately.Yeah I'm... sort of at a loss as to why stuff patched in 2023 is newsworthy. Is this particular set of exploits unique? Is the fact that CISA is issuing a notice unusual? (I mean I guess under current DHS it might be unusual for CISA to do anything at all, but still.)
I see it as evidence of why using an "unsupported" old iOS device (that no longer gets security updates) is not worth it. Bad actors are clearly still using those exploits even though they have been patched. It's a good PSA for those who are unaware of what threats are out thereIt's an article about 2nd-hand zero-days. Once a software company publishes that they've fixed a zero-day, most people probably expect that hackers would move on from using it, since it's patched. My interpretation is that this shows that hackers may be developing the hacks after the zero-day has been patched and details are available with the intent/knowledge that not everyone will be up to date immediately.
Use-After-Free Vulnerability
wired (ars's sister publication) did an article about this the other dayThis sounds like one of the professional tools that someone like the US government uses leaked and ended up on the black market. That would explain things like the seemingly high quality nature and even proper English comments rather than indications of Russian or Chinese origin.
CISA commonly releases direction for federal agencies (and folks at large) to patch old exploits that have been out for a while when they start seeing upticks in them being used or attempting to be used by bad actors.Yeah I'm... sort of at a loss as to why stuff patched in 2023 is newsworthy. Is this particular set of exploits unique? Is the fact that CISA is issuing a notice unusual? (I mean I guess under current DHS it might be unusual for CISA to do anything at all, but still.)
Definitely feels like Shadow Brokers and Equation Group sort of situation.wired (ars's sister publication) did an article about this the other day
https://www.wired.com/story/coruna-iphone-hacking-toolkit-us-government/
most likely was developed by a three letter agency or contracted out and then somehow smuggled
Are we saying that federal agencies don't have very strict security policies, audits and reporting in place to make sure these things are kept up to date?The Cybersecurity and Infrastructure Security Agency has ordered federal agencies to patch three critical iOS vulnerabilities that were exploited over a 10-month span
Your suspicions are (probably) correct. There's a very high likelihood that an employee at a defense contractor sold these secrets. He got 87 months which feels extremely light. This situation was discussed on the most recent Risky Business podcast episode.This sounds like one of the professional tools that someone like the US government uses leaked and ended up on the black market. That would explain things like the seemingly high quality nature and even proper English comments rather than indications of Russian or Chinese origin.
Damn. Didn't know about this case.Your suspicions are (probably) correct. There's a very high likelihood that an employee at a defense contractor sold these secrets. He got 87 months which feels extremely light. This situation was discussed on the most recent Risky Business podcast episode.
Wow, i never expected an article like this from Ars. It took a 3rd of the article’s length to reveal that this is something that’s specific for older iOS versions. Also, the title is hella clickbaity.
When Apple was looking around for code they could base their own browser on they evaluated Mozilla (Firefox uses this) and found it to be bloated, full of legacy cruft and difficult to maintain. It is why they chose KHTML....and Safari is WebKit-based.
One of Google's justifications for going to Chromium from WebKit (for Chrome) is there is so much legacy cruft in WebKit that it is bloated and difficult to maintain.
Because of WebKit's history, and that large chunks of it were written before modern browser code hardening practices, I won't use Safari on my MacOS devices, just Firefox.
But to each, their own, I suppose.![]()
“Advanced capabilities of Coruna include a never-before-seen JavaScript framework that uses a unique obfuscation method to prevent detection and reverse engineering.”The first sentence should’ve been “if you upgraded iOS since January 2024, please stop reading.”
When Apple was looking around for code they could base their own browser on they evaluated Mozilla (Firefox uses this) and found it to be bloated, full of legacy cruft and difficult to maintain. It is why they chose KHTML.
The linked Apple blog note looks like an important article but I don’t understand a lot of it. Does anyone else have an opinion of its credibility?
that doesnt answer the question.From the article:
Going by my website's traffic, about 2 to 3% of iOS users are still on vulnerable versions.that doesnt answer the question.
"Historical" means is this about exploits that happened historically and were exploited at the time or is it post 2024 and just about people who didnt patch. Most iOS users update within a few months so those are drastically different sizes of pools of victims
As recently as a few years ago, Mac users sometimes got separate Safari updates.Going by my website's traffic, about 2 to 3% of iOS users are still on vulnerable versions.
About half of iOS users upgrade within the first 3 months, and about 75% in the first 6 months. It gets much slower after that.
2 of the 3 vulnerabilities were in WebKit.
Apple famously do a decent job of rolling out operating system updates. However their contemporaries show them they could be significantly faster at rolling out rendering engine updates, by not tying Safari updates to operating system updates.
Try to keep up kid.Another week, another iOS vulnerability.
Because not everyone keeps their phone up-to-date, or they're on an older phone that can't be updated to iOS 18.x.Yeah I'm... sort of at a loss as to why stuff patched in 2023 is newsworthy. Is this particular set of exploits unique? Is the fact that CISA is issuing a notice unusual? (I mean I guess under current DHS it might be unusual for CISA to do anything at all, but still.)
If you look at the effort of 4+ page comments -deep true believers defending Google/Android .. at a minimum it’s plausible fodder to help defray criticism that Ars is soft on Apple.Wow, i never expected an article like this from Ars. It took a 3rd of the article’s length to reveal that this is something that’s specific for older iOS versions. Also, the title is hella clickbaity.
Seems to me like this was probably in that collection that Chinese APTs stumbled across that belonged to the NSA back in 2024.This sounds like one of the professional tools that someone like the US government uses leaked and ended up on the black market. That would explain things like the seemingly high quality nature and even proper English comments rather than indications of Russian or Chinese origin.
that doesnt answer the question.
"Historical" means is this about exploits that happened historically and were exploited at the time or is it post 2024 and just about people who didnt patch. Most iOS users update within a few months so those are drastically different sizes of pools of victims