cover of episode Why Apple sends spyware victims to this nonprofit security lab

Why Apple sends spyware victims to this nonprofit security lab

2024/12/23
logo of podcast TechCrunch Industry News

TechCrunch Industry News

People
报道者
Topics
报道者: 苹果公司拒绝对美国副总统候选人竞选团队工作人员的手机进行取证分析。苹果公司将间谍软件受害者引导至非营利组织AccessNow寻求帮助,而非其自身的安全工程师。尽管看起来苹果公司似乎放弃了保护用户的责任,但安全专家认为苹果的做法是正确的。 John Scott Rilton: 苹果公司向受害者发送间谍软件通知是间谍软件问责制研究的一个转折点,许多重要的案例都源于此。AccessNow的帮助热线是处理此类事件的合适场所,因为它能够进行良好的系统性分类工作和支持。锁定模式显著提高了设备安全性,尤其对于高危人群。 Natalia Krapiva: 苹果公司向受害者发送间谍软件通知是此类取证调查和高级间谍软件追踪方面发生的最伟大的事情之一。苹果公司应该停止调查个体攻击,而应专注于通知受害者。 Runa Sandvik: 大型科技公司不应参与对用户设备或账户进行取证分析。 Eva Galperin: 苹果公司可以做更多的事情来打击间谍软件,例如撰写更详细的报告和提起更多诉讼。 Nadine Hajja: 苹果公司致力于保护用户,并不断努力追踪间谍软件攻击者。

Deep Dive

Shownotes Transcript

Translations:
中文

This is TechCrunch. This episode is brought to you by Factor.

Notice how the days are shorter but your to-do lists aren't? Here's a trick: Factor. From breakfast to dinner and anything in between, Factor has easy, nutritious options to keep you fueled and feeling your best. My box at Factor is on its way and it could not get here sooner. I'm so excited because you get to choose from six menu preferences to help you manage calories, maximize protein intake, or avoid meat, or simply eat a well-balanced diet.

Whether you like routine or you enjoy mixing things up, Factor has you covered with 35 different delicious meals every week and over 60 additional convenience options you can add to your box like keto cookies, pressed juices, and smoothies.

Don't let shorter days slow you down. Stay energized with America's number one ready-to-eat meal delivery service. Head to factormeals.com slash 50TCIndustry and use code 50TCIndustry to get 50% off your first box plus free shipping. That's code 50TCIndustry at factormeals.com slash 50TCIndustry to get 50% off your first box plus free shipping while your subscription is active.

Before the elections, the cybersecurity team of U.S. Vice President and then-presidential candidate Kamala Harris reached out to Apple asking for help, according to Forbes, after a tool that's designed to detect spyware on iPhones flagged anomalies on two devices belonging to campaign staffers. Apple declined to forensically analyze the phones, per Forbes. The company's response is no surprise to the digital defenders working with at-risk populations,

often targeted by spyware. In the last few years, Apple has been sending notifications to targets and victims of government spyware, alerting them that they may have been hacked and directing them to get help. Crucially, Apple doesn't tell the targets to get in touch with its own security engineers, but with the non-profit

AccessNow, which runs a digital helpline for people in civil society who suspect they have been targets of government spyware. "Apple detected that you are being targeted by a mercenary spyware attack that is trying to remotely compromise the iPhone associated with your Apple account," reads a recent alert, which AccessNow shared with TechCrunch.

This attack is likely targeting you specifically because of who you are or what you do. Although it's never possible to achieve absolute certainty when detecting such attacks, Apple has high confidence in this warning. Please take it seriously. While it may look like Apple is abdicating its responsibility to protect its users, cybersecurity experts who work with human rights defenders, journalists, and dissidents generally agree that Apple's approach in alerting victims to spyware attacks is the right one.

These notifications have been a game-changer for spyware accountability research, said John Scott Rilton, a senior researcher at the Citizen Lab, a non-profit that investigates spyware, and is housed at the University of Toronto Munk School of Global Affairs and Public Policy. When I look back over the past few years, I see so many of the most important cases that we know about – Poland, Thailand, so many others – began with an

Apple notification, said Scott Rilton. For people who investigate spyware, Apple sharing spyware notifications with victims represented a turning point. Before the notifications, we were just like in the dark, not knowing who to check, according to AccessNow's legal counsel, Natalia Krapiva. I think it's one of the greatest things that's happened in the sphere of this kind of forensic investigations and hunting of sophisticated spyware, Krapiva told TechCrunch.

Now, when someone or a group of people get a notification from Apple, they are now warned that something potentially anomalous is happening with their device, that someone is targeting them, and that they need to get help. And Apple tells them exactly where to get it, according to Scott Rilton, who said AccessNow's helpline is the right place to go because the helpline is able to do good, systematic triage work and support.

Krapiva said that the helpline is staffed with more than 30 people, supported by others who work in other departments of the nonprofit. So far in 2024, Krapiva said AccessNow received 4,337 tickets through the helpline. Scott Railton, Krapiva, and security expert Runa Sandvik, who runs her own digital security consultancy Granit for at-risk people and has been protecting journalists for a decade, all agree Apple should stop short of investigating individual attacks

after notifying the victims. "Big tech companies don't want to get into the business of doing forensics on people's devices or accounts," Sandvik told TechCrunch. "I think that should remain separate." Eva Galperin, the director of cybersecurity at the non-profit Electronic Frontier Foundation, who has been investigating surveillance on the internet for more than a decade, said that Apple could still do more to combat spyware.

Apple could write more detailed reports and file more lawsuits. These are the things that take massive amounts of money NGOs don't have and telemetry NGOs don't have, Galperin told TechCrunch. In its official page about mercenary spyware, last updated in October, Apple says that since 2012 it has sent notifications to users in over 150 countries.

Apple spokesperson Nadine Hajja told TechCrunch that the vast majority of users will never be victims of such attacks. We sympathize deeply with the small number of users who are, and we continue to work tirelessly to protect them, and reiterated that there are no known cases of mercenary spyware on Apple devices with lockdown mode. Our security teams are constantly working to track mercenary spyware attackers, and we send threat notifications to inform and assist users who we believe were individually targeted.

For anyone alerted by a notification, Apple tells those targets and victims of spyware to update their iOS software and all their apps. Apple also suggests the user switches on Lockdown Mode, an opt-in iOS security feature that has stopped spyware attacks in the past by limiting device features that are often exploited to plant spyware. Apple said last year that it is not aware of any successful spyware infection against someone who used Lockdown Mode.

Scott Railton called lockdown mode a game-changer in increasing the security of people's devices, especially people who are at risk. All the experts TechCrunch spoke with strongly recommend turning on lockdown mode if you think you may be a target, especially if you are a journalist, human rights defender, or dissident. And if you get a notification from Apple, take it very seriously.