Help The Kashmir Monitor sustain so that we continue to be editorially independent. Remember, your contributions, however small they may be, matter to us.

‘Zero click’ attacks and Pegasus spyware: How does it infect phones?

pegasus


The ruckus around user privacy and spying on the phones of several noted personalities in India is growing. More than 300 verified mobile phone numbers, including of two serving ministers, over 40 journalists, three opposition leaders and one sitting judge besides scores of business persons and activists in India could have been targeted for hacking through an Israeli spyware sold only to government agencies, an international media consortium reported on Sunday.

The culprit is ‘Pegasus spyware’ here. The way it works is quite worrying as it no more requires a phone user to click on a link or a message to infect the device.

 

Instead the spyware works on ‘Zero-click’ attack making ‘Pegasus’ the most powerful spyware out there, more potent and almost impossible to detect or stop.

A report by The Guardian quoted Claudio Guarnieri of Amnesty International’s Berlin-based Security Lab, saying that once a phone was infiltrated, Pegasus had “more control” over it than the owner. This is because in an iPhone, for instance, the spyware gains “root-level privileges”. After this it can view everything from contact lists to messages and internet browsing history and send the same to the attacker.

How does it work?

A zero-click attack helps spyware like Pegasus gain control over a device without human interaction or human error. So all awareness about how to avoid a phishing attack or which links not to click are pointless if the target is the system itself. Most of these attacks exploit software which receive data even before it can determine whether what is coming in is trustworthy or not, like an email client.

Earlier this year, cybersecurity firm ZecOps claimed iPhones and iPads have had a traditional vulnerability to unassisted attacks, especially with its mail app. From iOS 13, this became a vulnerability to zero-click attacks too. “The vulnerability allows remote code execution capabilities and enables an attacker to remotely infect a device by sending emails that consume a significant amount of memory,” a ZecOps blog published this April said. Apple reportedly patched this in April 2020.

In November 2019, Google Project Zero security researcher Ian Beer showed how attackers take complete control of an iPhone in radio proximity without any user interaction. He claimed his exploit targeted the Apple Wireless Device Link (AWDL), the peer-to-peer wireless connectivity protocol that iOS devices use to talk to each other. Apple patched this when it released iOS 13.3.1, but accepted that it was powerful enough to “shut off or reboot systems or to corrupt kernel memory”.

On Android phones running version 4.4.4 and beyond, the vulnerability was via the graphics library. Attackers have also exploited vulnerabilities in Whatsapp, where a phone could be infected even if an incoming malicious call was not picked up, and in Wi-Fi, chipsets users to stream games and movies.

However, Amnesty claims even patched devices with the latest software have been breached.

Can zero-click attacks be prevented?

Zero-click attacks are hard to detect given their nature and hence even harder to prevent. Detection becomes even harder in encrypted environments where there is no visibility on the data packets being sent or received.

One of the things users can do is to ensure all operating systems and software are up to date so that they would have the patches for at least vulnerabilities that have been spotted. Also, it would make sense to not sideload any app and to download only via Google Play or Apple’s App Store. One way to go is to stop using apps altogether and switch to the browser for checking mails or social media, even on the phone.