Cyber Security News

“Mobile NotPetya”!! Surge in Zero-click Vulnerabilities, Conditions Favour

The cybersecurity community is sounding the alarm about the growing risk of a “mobile NotPetya” event – a self-propagating mobile malware outbreak that could have devastating consequences.

Over the past year, the alarming increase in the discovery and exploitation of zero-click vulnerabilities in mobile operating systems drives this concern.

alarming increase in the discovery and exploitation of zero-click vulnerabilities

In 2023 alone, more zero-click vulnerabilities were disclosed than combined in the prior four years.

Experts warn that the conditions are ripe for a mobile malware event on the scale of the 2017 NotPetya ransomware attack, which caused over $10 billion in damages worldwide.

Free Live Webinar for DIFR/SOC Teams: Securing the Top 3 SME Cyber Attack Vectors - Register Here.

The Rise of Zero-click Exploits

The critical ingredient for a “mobile NotPetya” is malware’s ability to spread autonomously through zero-click vulnerabilities without requiring user interaction.

Over the past few years, there has been a troubling surge in the discovery and exploitation of such vulnerabilities:

  • In May 2019, a WhatsApp zero-click vulnerability (CVE-2019-3568) allowed attackers to deliver Pegasus spyware to victims via malicious RTCP packets.
  • In December 2020, Citizen Lab reported on the “KISMET” zero-click exploit, which abused iOS 13.5’s messaging components to infect devices with Pegasus.
  • In September 2021, Citizen Lab disclosed the “FORCEDENTRY” zero-click exploit, which targeted a vulnerability (CVE-2021-30860) in Apple’s image rendering library.
  • In April 2023, Apple patched a zero-click vulnerability (CVE-2023-28205) in iOS that may have been actively exploited.
  • In June 2023, Kaspersky disclosed the “Operation Triangulation” campaign, which exploited six zero-day vulnerabilities, including one that could write to unknown hardware registers.

The number of disclosed zero-click exploits has skyrocketed, from just 3 in 2019-2022 to 6 in the first two quarters of 2023 alone.

Experts warn that this trend will continue as spyware firms and other threat actors dedicate resources to finding and exploiting these vulnerabilities.

Recorded Future recently released an article highlighting the surge in zero-click vulnerabilities in the Mobile NotPetya malware.

The article also discusses the favorable conditions for such vulnerabilities to be exploited.

Conditions Ripe for a “Mobile NotPetya”

The key elements for a devastating mobile malware outbreak are all in place:

  1. Zero-click exploits: Spyware firms’ ongoing development of zero-click vulnerabilities allows malware to spread autonomously.
  2. Autonomous spread: Mobile malware could abuse contact lists and Bluetooth to propagate to new victims.
  3. Monoculture landscape: Android and iOS dominate the mobile OS market, meaning a single vulnerability could have an outsized impact.
  4. Lack of effective mitigations: Measures like Apple’s Lockdown Mode are unlikely to be widely adopted, and tech companies have no clear public plans to stop a mobile malware outbreak.
  5. Heightened motivations: Geopolitical tensions and the sophistication of cybercriminal groups increase the risk of a mobile malware attack being deployed deliberately or accidentally.

Experts believe telecommunications providers and device manufacturers may have some tools to stop a mobile NotPetya in its tracks, such as:

  • Filtering messages based on header information that is consistent across malicious messages
  • Blocking messages originating from geographic clusters of infected devices

However, these measures have not been tested at scale and may only be implemented once an outbreak is underway, limiting their effectiveness.

The cybersecurity community is sounding the alarm – the conditions are ripe for a devastating “mobile NotPetya” event.

The risk of a large-scale mobile malware outbreak is growing with the surge in zero-click vulnerabilities and the lack of clear mitigation strategies.

Tech companies, governments, and the security community must urgently address this emerging threat before it’s too late.

Looking to Safeguard Your Company from Advanced Cyber Threats? Deploy TrustNet to Your Radar ASAP

Dhivya

Divya is a Senior Journalist at Cyber Security news covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

Investigating Two TeamCity Authentication Bypass Vulnerabilities

Vulnerability exploits are the third most common way that cybercriminals gain access to target organizations,…

39 seconds ago

Threat Actors Claiming of 0-Day Vulnerability in Zyxel VPN Device

Threat actors have claimed to have discovered a 0-day vulnerability in Zyxel VPN devices. This…

2 hours ago

Muddling Meerkat Using DNS As A Powerful Weapon For Sophistication

Hackers exploit DNS vulnerabilities to redirect users to malicious websites, launch distributed denial-of-service (DDoS) attacks…

3 hours ago

Pathfinder – New Attack Steals Sensitive Data From Modern Processors

Microarchitectural side-channel attacks misuse shared processor state to transmit information between security domains.  Although they…

3 hours ago

Beware of New Android Trojan That Executes Malicious Commands on Your Phone

Cybersecurity researchers at XLab have uncovered a new Android malware strain called "Wpeeper." This sophisticated…

4 hours ago

Authorities Seized Platform Used For Paid DDoS

On April 17, 2024, a joint effort between the Dresden Public Prosecutor’s Office and the…

5 hours ago