Ransomware Actors Exploiting iTunes and iCloud Zero Day on Windows

  • Researchers have discovered a blunder in Bonjour’s coding, which introduces a well-documented flaw.
  • A capable group of malicious actors have found it and have been exploiting it since August this year.
  • Apple has fixed the zero-day last week, so users of iTunes and iCloud on Windows need to update.

According to a report by security researchers of Morphisec, there’s an ongoing ransomware campaign that exploits a zero-day vulnerability in the Bonjour updater. Bonjour is Apple’s software updater that comes bundled with iTunes and iCloud. While Apple has decided to sunset iTunes for macOS, Windows users will continue using it indefinitely. As reported by the researchers, they noticed attacks that abused an unquoted path to maintain persistence and evade detection, based on a technique that was first discovered 15 years ago. That said, this is a case of carelessness from the developers of Bonjour and at the same time, thorough research from the attackers.

Even if iTunes is uninstalled from the system, Bonjour remains there as it is a separate program that needs to be removed individually. In most cases, users are not aware of this, but the attackers are. This leaves thousands of enterprise-level systems vulnerable to attacks due to the existence of Bonjour, which remains active in the background. If the iTunes has been removed from the system, Bonjour doesn’t have anything to point at, so there are no update checks and patch downloads, yet the utility is still running.

By taking advantage of the “unquoted path” flaw, the attackers can execute ransomware executables (BitPaymer in this case) through Bonjour without the AV tools catching the activity as suspicious. Bonjour is a signed app from a trusty vendor, so whatever runs through it is treated with trust by AV solutions. The malicious file can be placed anywhere, and the only requirement for the attacker is to have write-privileges for the containing folders. The researchers have observed no successful privilege escalation attacks, but this could be theoretically possible if the actors were going for that.

Source: Morphisec blog

The attacks that were observed and analyzed are attributed to the “BitPaymer/IEncrypt” group, who is a notorious and very capable malicious actor. The first signs of this activity appeared in August 2019, and Apple was almost immediately informed of the vulnerability. The tech company released fixing patches for iCloud and iTunes on both Windows 7 and Windows 10, along with a relevant security advisory.

Have something to comment on the above? Let us know of your opinion in the section below, or on our socials, on Facebook and Twitter.



How to Watch Westworld Season 4 Online From Anywhere

The fourth season of your favorite science fiction dystopian TV series is set to premiere soon, and we know you want to...

How to Watch 2022 BET Awards Online From Anywhere

The 2022 BET Awards are here, so be ready to celebrate African American entertainers who have excelled in the field of music,...

How to Watch Jack Osbourne’s Night of Terror: Bigfoot Online From Anywhere

Discovery+ is here with a new 2-hour special featuring Jack Osbourne, and we're looking forward to watching it online. If you're interested...
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: Chrome, Edge, Firefox, Safari