When in March Apple pushed out security updates for its many products, much attention has been given to a zero-day bug discovered by a team of Johns Hopkins University researchers, which could have allowed attackers to decrypt intercepted iMessages.
But on Friday more details about it have been revealed by the researchers who unearthed it, and it’s not only critical, as it allows attackers to steal a victim’s message history in addition to any message attachments, but also extremely easy to exploit.
“An attacker could exploit this vulnerability by sending a malicious message to a victim, which could be manipulated to appear as if it came from a trusted source. The message would contain a link that, when clicked by the victim, would give the attacker access to the victim’s messages and attachments almost instantly,” the researchers noted.
Here’s a short demonstration of the attack:
“It would have been a devastating attack for anyone to experience,” said Joe DeMesy, a security associate at cybersecurity consulting firm Bishop Fox who is one of the three researchers responsible for the finding. “Think about what you usually send to your friends and family via message. Private photos, personal information, all kinds of content you wouldn’t want to fall into the wrong hands.”
The researchers disclosed their finding to Apple, and the parties worked together to quickly remediate the issue. “Apple was responsive from the start and kept the lines of communication open throughout the disclosure process,” said Carl Livitt, a partner at Bishop Fox.
If you are one of the many Messages for OS X users and have yet to update your software to the newest version, both Apple and Bishop Fox advise doing so immediately.