Skip to content Skip to footer
0 items - $0.00 0

Blasting Past WebP – An analysis of the NSO BLASTPASS iMessage exploit by el_duderino

Blasting Past WebP – An analysis of the NSO BLASTPASS iMessage exploit by el_duderino

Blasting Past WebP – An analysis of the NSO BLASTPASS iMessage exploit by el_duderino

4 Comments

  • Post Author
    cedws
    Posted March 27, 2025 at 1:17 pm

    It’s always codecs.

    I don’t always buy into the $safelanguage cargo cult but come on, it’s apparent that memory unsafe languages are not appropriate for this purpose and desperately need replacing.

  • Post Author
    TheDong
    Posted March 27, 2025 at 2:40 pm

    It feels so ridiculous to me that a total stranger can send an iMessage message to me, including some attachment, and my phone will process that message in the kernel.

    How hard would it be for apple to have a setting of "Only receive messages from mutual contacts", and require the stranger to first "request to be added to contacts" (a message which is tightly controlled, and obviously doesn't include a pdf file or webp or whatever), and have the apple imessage server drop all other messages from them until I accept.

    Signal has "message requests". iMessage doesn't have "message requests", and receives messages in a unique path which goes through the kernel.

    Like, sure the attacker could hit my Mom with a wrench and iMessage me a PDF exploit that way, but I feel like requiring physical access to one of my contact's phones raises the bar significantly over the current state of affairs.

  • Post Author
    botanical
    Posted March 27, 2025 at 2:45 pm

    NSO Group are a terrorist group for hire. This 0-click, 0-day exploit was found targeting civil society. Any one can pay to target journalists, NGOs, politicians. This is why open-source is paramount to security, and having code out in the open.

  • Post Author
    ipython
    Posted March 27, 2025 at 3:26 pm

    I'm sure nobody would think of targeting the national security apparatus of the USG with such an exploit to gain access to… I dunno, their Signal messages?

Leave a comment

In the Shadows of Innovation”

© 2025 HackTech.info. All Rights Reserved.

Sign Up to Our Newsletter

Be the first to know the latest updates

Whoops, you're not connected to Mailchimp. You need to enter a valid Mailchimp API key.