Apple on Wednesday released emergency security patches on a new zero-day, the 17th it has reported this year.The zero-day – CVE-2023-42824 – a privilege escalation issue that resides in the Kernel, was discovered attacking both iPhone and iPad devices. In its advisory, Apple said it was aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.6.The increased frequency of attacks on Apple devices – the last Apple zero-day SC reported was on September 22 – has caused some alarm, but some security researchers say the attackers are not necessarily singling out Apple.“While it may appear as if Apple has been the focus, many of the Apple zero-day exploits are based in open source software that’s used by many vendors, including Microsoft and Google, explained Bud Broomhead, chief executive officer at Viakoo. “Instead of thinking of this as ‘yet another’ Apple zero-day, it should be thought of as ‘yet another’ open source zero-day.” Broomhead added that with conflicts raging like the Russia-Ukraine war that have a significant cyber focus, spillover from the battlefield to private business and individuals will happen. Broomhead said the growth of spyware such as Pegasus into the private sector has been one element that’s fueling the growth of zero-days into consumer products like Apple.Many of the new zero-days targeting Apple have been vulnerabilities exploited by commercial spyware vendors, explained Ken Westin, Field CISO at Panther Labs. Westin said the spyware vendors rely on these exploits to deploy their spyware to unsuspecting targets. However, once used against a target, Westin said they essentially play their hand and researchers from Citizen Lab, Google, and others have identified the vulnerabilities being exploited and notify Apple to patch them.“Less than ethical researchers can make quite a bit of money selling the exploits to these companies,” Westin said. “There’s an increase in demand for spyware by authoritarian regimes, although the commercial spyware vendors say they only sell to certain countries for certain uses, it has been proven several times that it’s often not the case and the spyware gets used to target dissidents, journalists and political rivals. Companies like NSO Group have been blacklisted by the U.S. government and are under increased pressure at home and abroad, but other spyware vendors have come into the market.”
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds