Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

iOS Version of Exodus Spyware Discovered in an Escalating Italian Spy Scandal

On March 29, 2019, Security Without Borders described the discovery of Android spyware it termed Exodus. The story linked the spyware to a company called eSurv with links to Italian government agencies.

On March 29, 2019, Security Without Borders described the discovery of Android spyware it termed Exodus. The story linked the spyware to a company called eSurv with links to Italian government agencies.

Now mobile security firm Lookout has discovered and described iOS versions of the malware. They “were available outside the app store, through phishing sites, and abused the Apple Developer Enterprise program.” It had apparently discovered and analyzed Exodus independently of Security Without Borders. In a new report published April 8, 2019, it adds a few details to the Security Without Borders report, but specifically describes an iOS version of the spyware.

Lookout’s analysis of the Android version led to the discovery of an infrastructure containing several samples of an iOS port. This iOS version was deployed to users outside of the Apple store by abusing Apple’s enterprise provisioning system — which is designed to allow organizations to distribute proprietary, in-house apps to employees without reference to the App Store. Although not a common method of distributing Apple malware, it is not unique. 

This method requires a mobile provisioning profile with an enterprise certificate. All the iOS versions used profiles and the certificate of Connexxa SRL, an Italian firm with strong connections to eSurv.

The iOS version is not as sophisticated as the Android version, but is still able to exfiltrate contacts, audio recordings, photos, videos, GPS location and device information. The malicious code was initialized at application launch without the user’s knowledge. Timers were set up to gather and upload data periodically. The stolen data was queued via HTTP PUT requests to an endpoint on the C2 server, using the same infrastructure as that used by the Android version.

Lookout shared its research with Apple, who revoked the affected certificates. As a result, no new instances of this version can be installed on iOS devices, and existing installations will no longer function.

Meanwhile, Claudio Guarnieri (who founded Security Without Borders in December 2016) provided more information on what he describes as ‘a spy scandal in Italy’. In a personal blog post under the name ‘Nex’ on April 4, 2019, Guarnieri explains that the authorities had already started an investigation before Security Without Borders published its expose. 

“The prosecutor of Napoli informed the press that an investigation was active on the company and that a few days prior to our publication a judge issued a seizure warrant for eSurv and its assets, as well as another company, STM s.r.l.” This would explain why the eSurv website was inaccessible at the time of SecurityWeek’s first posting on this story. At the time of writing now, both the eSurv and Connexxa websites have disappeared.

Guarnieri explains that Exodus had been supplied to numerous public prosecutor’s offices across Italy — but that it didn’t always function correctly. “The prosecutorís office of Benevento,” he writes, “recently realized, during yet another apparent malfunction, that the Exodus spyware in their use wasnít exfiltrating and storing data on the local server in the premises of the office (as mandated by Italian law), but on Amazon cloud instances instead.” 

The local server supplied to store the intercepts appears to have been fake. “As a matter of fact,” comments Guarnieri, “the press reports, the server provided to the public prosecutorís office wasnít even equipped with an Operating System, and contained no data at all. Essentially it was an empty box.”

The Rome Chronicle (in Italian; translation by Google) reports, “They had created a private archive using an Amazon server in Oregon and there they downloaded thousands of photos, videos, private conversations via WhatsApp and other message applications, interview recordings.”

It appears that Exodus is software designed for government agencies to undertake lawful intercepts, but that flaws in the software and possible abuse by its developers meant that it engaged in illegal ‘lawful’ intercepts under Italian law, and then exported personal information from users — potentially innocent users — outside of Europe (in contravention of GDPR).

This appears to be developing into a full-blown Italian scandal. “This software,” comments Guarnieri, “was in use by law enforcement all over Italy.” He adds, “More recent [press] reports are now suggesting that the story might go deeper and darker than originally anticipated. The press is currently suggesting that illegal spying might have been operated on behalf of unknown entities and that this investigation is crossing with separate investigations dealing with corruption in Calabria.”

Related: Windows Defender ATP Detects Spyware Used by Law Enforcement: Microsoft 

Related: iPhone Spyware Spotlights Israel’s Secretive Surveillance Industry 

Related: Researchers Out Spy Tools That Let Governments Hack Your Smartphone 

Related: Hackers Expose India’s Backdoor Intercept Program 

Written By

Kevin Townsend is a Senior Contributor at SecurityWeek. He has been writing about high tech issues since before the birth of Microsoft. For the last 15 years he has specialized in information security; and has had many thousands of articles published in dozens of different magazines – from The Times and the Financial Times to current and long-gone computer magazines.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.

Register

Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.

Register

Expert Insights

Related Content

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.

Mobile & Wireless

Apple’s iOS 12.5.7 update patches CVE-2022-42856, an actively exploited vulnerability, in old iPhones and iPads.

Mobile & Wireless

The February 2023 security updates for Android patch 40 vulnerabilities, including multiple high-severity escalation of privilege bugs.

Mobile & Wireless

Two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.

Mobile & Wireless

South Dakota Gov. Kristi Noem says her personal cell phone was hacked and linked it to the release of documents by the January 6...

Cybercrime

Pig Butchering, also known as Sha Zhu Pan and CryptoRom, is an ugly name for an ugly scam.