Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.

MacRumors

macrumors bot
Original poster
Apr 12, 2001
68,115
38,874



Google's Project Zero last week shared details about multiple serious iOS vulnerabilities that allowed malicious websites to access a victim's phone. There were a total of 14 vulnerabilities that were being exploited, and while those have now been fixed, some of the security holes were abused for several years.

Apple today responded to Google's Project Zero blog post in an effort to address customer concerns with all of the facts.

trio-iphones-ios.jpg

Apple says the attack was "narrowly-focused" rather than a broad-based exploit of iPhones as described. Fewer than a dozen websites targeting Uighur Muslims were affected, according to Apple. Further, Apple says that Google created a false impression of mass exploitation, causing fear among iPhone owners.

Google also got the length of the attacks wrong. Apple says the websites were operational for approximately two months rather than two years, with the vulnerabilities fixed 10 days after Apple learned about them. Fixes were already in the works when Google approached Apple.

Apple's full letter is included below:
Last week, Google published a blog about vulnerabilities that Apple fixed for iOS users in February. We've heard from customers who were concerned by some of the claims, and we want to make sure all of our customers have the facts.

First, the sophisticated attack was narrowly focused, not a broad-based exploit of iPhones "en masse" as described. The attack affected fewer than a dozen websites that focus on content related to the Uighur community. Regardless of the scale of the attack, we take the safety and security of all users extremely seriously.

Google's post, issued six months after iOS patches were released, creates the false impression of "mass exploitation" to "monitor the private activities of entire populations in real time," stoking fear among all iPhone users that their devices had been compromised. This was never the case.

Second, all evidence indicates that these website attacks were only operational for a brief period, roughly two months, not "two years" as Google implies. We fixed the vulnerabilities in question in February -- working extremely quickly to resolve the issue just 10 days after we learned about it. When Google approached us, we were already in the process of fixing the exploited bugs.

Security is a never-ending journey and our customers can be confident we are working for them. iOS security is unmatched because we take end-to-end responsibility for the security of our hardware and software. Our product security teams around the world are constantly iterating to introduce new protections and patch vulnerabilities as soon as they're found. We will never stop our tireless work to keep our users safe.
According to Google, the websites in question that targeted iPhone users were able to steal private data like messages, photos, and GPS location in real time with little effort after a visitor went to an infected website.

Google believes thousands of visitors accessed these websites per week over two years, with the vulnerability present in iOS 10, iOS 11, and iOS 12. Apple addressed the issues in iOS 12.1.4 back in February 2019.

In a statement to The Verge, Google said that it stands by its original report despite Apple's comments.
Project Zero posts technical research that is designed to advance the understanding of security vulnerabilities, which leads to better defensive strategies. We stand by our in-depth research which was written to focus on the technical aspects of these vulnerabilities. We will continue to work with Apple and other leading companies to help keep people safe online.

Article Link: Apple Disputes Some Details of Google's Project Zero Report on iOS Security Vulnerabilities [Updated]
 
While I generally think Apple is one of the most ethical corporations ATM, I’m not sure who to believe.

If Apple’s right, then Google’s misrepresentations are damaging, bordering on libel coming from a close competitor. Their reports did a lot of damage to the narrative that iOS is more secure than Android (not that Android hasn’t come a long way).
 
Damage control

I'm sure Apple isn't lying when saying these sites were operating for two months, but I wonder if they're skirting the truth by not acknowledging there were other websites, propagators that could have been exploiting the same vulnerabilities. Hopefully they continue to offer some transparency and improve their practices if there's such potential in lapses.
 
As I read between the lines, the difference between 2 months and 2 years seems to be whether the potential existed (2 years), and the duration of known exploitation of the vulnerability (2 months).

It's often this way with reporting of exploits, regardless of what platform is affected. To the media and the researchers reporting the exploit there's a tendency to focus on the hypothetical worst case scenario - more drama gains more attention. Those responsible for the platform are far more likely to focus on the real-world impact, which is generally less severe than the worst-case.

I'm sure we've all had these arguments with siblings and parents when we were young. You leave the door unlocked when you go out. Mom later scolds, "Robbers could have cleared out our home!" You reply, "But nothing happened!" And so on.
 
Can someone give an ELI5 for how these exploits worked? Or like show a video of these exploits in action? I'm having a hard time finding a simple explanation. The exploits worked by literally just visiting these sites, or did the sites prompt users to install some sort of configuration profile?
 
I’m not sure who to believe. [...]

Rene Ritchie covered this comprehensively in his Vector podcast a few days ago: "How iPhone Users Were Attacked — By Google's Project Zero". Anyone who is not sure can see the details there. His provides references to everything he cited in that video in the YouTube description.


I highly recommend Rene's video series -- especially this episode.
 
While I generally think Apple is one of the most ethical corporations ATM, I’m not sure who to believe.

Go to the security websites. Long before this post their analysis agrees with Apple’s storyline. Google only stumbled upon this exploit chain because they were investigating simpler chains used to exploit Android emanating from the same sites (China is using these hacks to monitor Uirgyr Muslims, because of costs many more of them obviously use Android smartphones), many of which are still effectively unpatched because Google doesn’t have a chain to fix them to most of the Android world or involve exploits (apps) outside Googles control.

It is important to note that Google may not have intended the news agencies to pick this story up in the way it did. Let’s not get ascribe maliciousness on something essentially meant as a retrospective to inform the security industry (while avoiding implicating the state actor behind it, the Chinese government) that got really out of hand.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.