logoalt Hacker News

happyopossumyesterday at 9:03 PM4 repliesview on HN

"Possible" stripped from the headline on HN. That word seems particularly important given that it's speculative:

"Clues suggest it was originally built for the US government."


Replies

tptacekyesterday at 9:39 PM

The Google threat analysis report doesn't say anything about USG involvement; that it was found on compromised Ukrainian sites, has code written in "native English", but also signs of LLM authorship. The Google report says the kit they found can't compromise current iOS, which is a capability you'd assume USG would have --- though it's important remember that "USG" comprises dozens of different buyers each with different toolchains.

Maybe this was the Fisheries Department exploit toolkit.

iVerify, which spun out of Trail of Bits and presumably knows what they're talking about, says it bears "hallmarks" of being connected to USG CNE work. I believe it. But the USG is on net a buyer, not a producer, of CNE tooling. Whatever a given service agency or IC arm buys, dozens of other aligned countries are also buying.

(And, of course, the non-aligned countries have their own commercial supply chains).

show 1 reply
dangyesterday at 10:06 PM

The title limit is 80 chars, if anyone wants to figure out a decent way to squeeze possibility back in there.

show 2 replies
Simulacrayesterday at 10:05 PM

Good point, that was also struck by the comment that it's infected "tens of thousands" phones. That's a minuscule rounding error.

aaron695yesterday at 10:31 PM

[dead]