The three zero-day flaws addressed by Apple on September 21, 2023, had been leveraged as a part of an iPhone exploit chain in an try to ship a spy ware pressure referred to as Predator concentrating on former Egyptian member of parliament Ahmed Eltantawy between Could and September 2023.
“The concentrating on came about after Eltantawy publicly acknowledged his plans to run for President within the 2024 Egyptian elections,” the Citizen Lab mentioned, attributing the assault with excessive confidence to the Egyptian authorities owing to it being a recognized buyer of the business spying software.
In accordance with a joint investigation performed by the Canadian interdisciplinary laboratory and Google’s Risk Evaluation Group (TAG), the mercenary surveillance software is claimed to have been delivered by way of hyperlinks despatched on SMS and WhatsApp.
“In August and September 2023, Eltantawy’s Vodafone Egypt cell connection was persistently chosen for concentrating on by way of community injection; when Eltantawy visited sure web sites not utilizing HTTPS, a tool put in on the border of Vodafone Egypt’s community mechanically redirected him to a malicious web site to contaminate his cellphone with Cytrox’s Predator spy ware,” the Citizen Lab researchers mentioned.

The exploit chain leveraged a set of three vulnerabilities – CVE-2023-41991, CVE-2023-41992, and CVE-2023-41993 – which might enable a malicious actor to bypass certificates validation, elevate privileges, and obtain distant code execution on focused units upon processing a specifically crafted net content material.
Predator, made by an organization referred to as Cytrox, is analogous to NSO Group’s Pegasus, enabling its clients to surveil targets of curiosity and harvest delicate information from compromised units. A part of a consortium of spy ware distributors referred to as the Intellexa Alliance, it was blocklisted by the U.S. authorities in July 2023 for “enabling campaigns of repression and different human rights abuses.”
The exploit, hosted on a site named sec-flare[.]com, is claimed to have been delivered after Eltantawy was redirected to an internet site named c.betly[.]me by way of a classy community injection assault utilizing Sandvine’s PacketLogic middlebox located on a hyperlink between Telecom Egypt and Vodafone Egypt.
“The physique of the vacation spot web site included two iframes, ID ‘if1’ which contained apparently benign bait content material (on this case a hyperlink to an APK file not containing spy ware) and ID ‘if2’ which was an invisible iframe containing a Predator an infection hyperlink hosted on sec-flare[.]com,” the Citizen Lab mentioned.
Google TAG researcher Maddie Stone characterised it as a case of an adversary-in-the-middle (AitM) assault that takes benefit of a go to to an internet site utilizing HTTP (versus HTTPS) to intercept and power the sufferer to go to a distinct website operated by the menace actor.
“Within the case of this marketing campaign, if the goal went to any ‘http’ website, the attackers injected visitors to silently redirect them to an Intellexa website, c.betly[.]me,” Stone defined. “If the consumer was the anticipated focused consumer, the location would then redirect the goal to the exploit server, sec-flare[.]com.”
Eltantawy acquired three SMS messages in September 2021, Could 2023, and September 2023 that masqueraded as safety alerts from WhatsApp urging Eltantawy to click on on a hyperlink to terminate a suspicious login session originating from a purported Home windows machine.
Whereas these hyperlinks do not match the fingerprint of the aforementioned area, the investigation revealed that the Predator spy ware was put in on the machine roughly 2 minutes and 30 seconds after Eltantawy learn the message despatched in September 2021.
AI vs. AI: Harnessing AI Defenses In opposition to AI-Powered Dangers
Able to sort out new AI-driven cybersecurity challenges? Be part of our insightful webinar with Zscaler to handle the rising menace of generative AI in cybersecurity.
He additionally acquired two WhatsApp messages on June 24, 2023, and July 12, 2023, by which a person claiming to be working for the Worldwide Federation for Human Rights (FIDH) solicited his opinion on an article that pointed to the web site sec-flare[.]com. The messages had been left unread.
Google TAG mentioned it additionally detected an exploit chain that weaponized a distant code execution flaw within the Chrome net browser (CVE-2023-4762) to ship Predator on Android units utilizing two strategies: the AitM injection and by way of one-time hyperlinks despatched on to the goal.
CVE-2023-4762, a sort confusion vulnerability within the V8 engine, was anonymously reported on August 16, 2023, and patched by Google on September 5, 2023, though the web big assesses that Cytrox/Intellexa could have used this vulnerability as a zero-day.
In accordance with a short description on the Nationwide Vulnerability Database (NVD), CVE-2023-4762 issues a “kind confusion in V8 in Google Chrome previous to 116.0.5845.179 [that] allowed a distant attacker to execute arbitrary code by way of a crafted HTML web page.”
The most recent findings, moreover highlighting the abuse of surveillance instruments to focus on the civil society, underscores the blindspots within the telecom ecosystem that may very well be exploited to intercept community visitors and inject malware into targets’ units.
“Though nice strides have been made lately to ‘encrypt the net,’ customers nonetheless often go to web sites with out HTTPS, and a single non-HTTPS web site go to can lead to spy ware an infection,” the Citizen Lab mentioned.
Customers who’re vulnerable to spy ware threats due to “who they’re or what they do” are really useful to maintain their units up-to-date and allow Lockdown Mode on iPhones, iPads, and Macs to stave off such dangers.


