Welcome to our

Cyber Security News Aggregator

.

Cyber Tzar

provide a

cyber security risk management

platform; including automated penetration tests and risk assesments culminating in a "cyber risk score" out of 1,000, just like a credit score.

Exclusive: New Apple Zero Day Traded on the Dark Web

published on 2022-09-05 14:57:27 UTC by Liran Sorani
Content:

Recently there has been a lot of discussion about the two Apple vulnerabilities, which affect most of its devices, including macOS, iOS, iPadOS. 

The two vulnerabilities tracked as CVE-2022-32893 and CVE-2022-32894 allow RCE (Remote Code Execution) access and in some of the devices kernel permissions, which provide full and extensive permissions on the device. Both are related to the Safari WebKit web browser extension, and the OS kernel. Apple said it was aware of reports that both vulnerabilities may already have been actively exploited in the wild – making the need to patch more urgent.

By using our Cyber API, we have been able to exclusively trace another undetected, at the time of publication, Zero Day relating to one of the existing CVE – traded on the dark web.

But before we discuss that, let’s first understand the nature of these vulnerabilities.

What threats do the exposed CVEs pose to Apple users?

Let’s better understand the implication of these exploits:

CVE-2022-32893

This vulnerability is an RCE flaw affecting Apple’s Safari Web browser WebKit. 

Attack Method: An attacker could maliciously craft a web page, which if visited by a WebKit-powered browser, will lead to the execution of an unauthorized code on the device. 

Exposure/Risk level: High, since Webkit is the base engine that is used by any browsers on iOS and macOS, whether Safari, Chrome, or any other. This means that every Apple user is exposed to this vulnerability.

Affected Devices: iPhone 6 and later models, iPad Pro, iPad Air 2 onwards, iPad 5th generation and newer models, iPad mini 4 and newer versions, iPod touch (7th generation), and macOS Monterrey.

CVE-2022-32894

This vulnerability is another RCE but this time a kernel-level code execution, which requires initial access to the affected device, for example by using the CVE-2022-32893 to gain access to the remote device.

Attack Method: The attack is caused by an out-of-bounds write an issue and is addressed by improving the bounds checking of the vulnerable components.

Exposure level: Once the threat actor gains access and exploits the vulnerability, they could move from controlling just a single app on the device to taking over the OS and activating any app whether its camera, microphone, accessing all data on the device, and more.

Affected Devices: All devices mentioned above.

Now that we discussed the risk these CVEs pose to Apple users, let’s take a look at what we found on the dark web.

A new Apple Zero Day Vulnerability Traded on the Dark Web

A few days after the initial vulnerability was exposed, we were able to find a post in which a hacker is offering a new zero day around the same CVE-2022-32893 for €2.5 million.

This is what we consider to be a unique publication of a zero day, because it is rare that a hacker publicly sells zero day, especially related to a large enterprise such as Apple.

This specific hacker has a history of selling zero days for Apple and Android.

A threat actor is offering a zero day for an Apple vulnerability for  €2.5 million.

This does not come as a surprise as we have been able to see a higher level of activity on the dark web around the time the publication about the vulnerabilities. We ran a search of the two vulnerabilities by using our Dark Web API and this is what we found: 

Breakdown of the number of mentions of Apple CVEs per network

Most of the activity was around technical forums, some Telegram hacking channels, and image boards, even one mention of them on an alternative social platform.

In the image below you can see a discussion between hackers about CVE-2022-32893/4. Threat actors are trying to exploit the CVE as fast as possible. They are also looking for additional zero days around the already existing WebKit patch.

a discussion between hackers about CVE-2022-32893/4.

Were there early indications before the original Apple zero day vulnerabilities were found?

We used our cyber data feeds to search for indications around the WebKit and the out-of-bounds issue that was exploited including Kernel. We were able to find a pattern, in which in some cases, the discussion takes place even before the official publication of the CVE.

In many of the spikes you can see in the chart below, we were able to find early discussions between hackers about Webkit just before the CVEs were found, which means that they target a specific platform/system. This can serve as a valuable alert for organizations to proactively take measures and mitigate the potential threat. 

Malicious mentions of Webkit before recent CVEs were exposed

Webz.io’s Dark Web API provides the critical data needed to discover discussions around vulnerabilities, and the expertise to locate malicious activities ahead of time by finding new exploits for specific platforms traded or discussed on the deep and dark web.

Article: Exclusive: New Apple Zero Day Traded on the Dark Web - published about 2 years ago.

https://webz.io/dwp/exclusive-new-apple-zero-day-traded-on-the-dark-web/   
Published: 2022 09 05 14:57:27
Received: 2022 09 05 15:14:11
Feed: Webz.io Dark Web Posts Data Breach Threats
Source: Webz.io Dark Web Posts
Category: News
Topic: Data Breach Threats
Views: 1

Custom HTML Block

Click to Open Code Editor