Variston IT: empresa de Barcelona que reven vulnerabilitats Zero-Day utilitzades per programari espia

Hem tingut l’ex­pe­ri­èn­cia de Pega­sus amb l’es­pi­o­natge a polí­tics i peri­o­dis­tes cata­lans i vascos. Era una empresa isra­e­li­ana i poc podia fer el nostre Parla­ment català, però ara veiem que a casa nostra ha sortit Varis­ton IT que ven vulne­ra­vi­li­tats de Chrome, Defen­der i Fire­fox que poden utilit­zar d’al­tres per atacar a la gent i espiar-la. Farà el Parla­ment res respecte al progra­mari espia?

Chrome, Defen­der, and Fire­fox 0-days linked to commer­cial IT firm in Spain

Varis­ton IT finger­prints found in source code for advan­ced Chrome exploit.

Google rese­ar­chers said on Wednes­day they have linked a Barce­lona, Spain-based IT company to the sale of advan­ced soft­ware frame­works that exploit vulne­ra­bi­li­ties in Chrome, Fire­fox, and Windows Defen­der.

Varis­ton IT bills itself as a provi­der of tailor-made infor­ma­tion secu­rity solu­ti­ons, inclu­ding: tech­no­logy for embed­ded SCADA (super­vi­sory control and data acqui­si­tion) and Inter­net of Things inte­gra­tors; custom secu­rity patches for propri­e­tary systems; tools for data disco­very; secu­rity trai­ning; and the deve­lop­ment of secure proto­cols for embed­ded devi­ces. Accor­ding to a report from Google’s Threat Analy­sis Group, Varis­ton sells anot­her product not menti­o­ned on its website: soft­ware frame­works that provide everyt­hing a custo­mer needs to surrep­ti­ti­ously install malware on devi­ces they want to spy on.

Rese­ar­chers Clement Lecigne and Benoit Sevens said the exploit frame­works were used to exploit n-day vulne­ra­bi­li­ties, which are those that have been patched recently enough that some targets haven’t yet insta­lled them. Evidence suggests, they added, that the frame­works were also used when the vulne­ra­bi­li­ties were zero-days. The rese­ar­chers are disclo­sing their findings in an attempt to disrupt the market for spyware, which they said is booming and poses a threat to vari­ous groups.

“TAG’s rese­arch unders­co­res that the commer­cial survei­llance industry is thri­ving and has expan­ded signi­fi­cantly in recent years, crea­ting risk for Inter­net users around the globe, ” they wrote. “Commer­cial spyware puts advan­ced survei­llance capa­bi­li­ties in the hands of govern­ments who use them to spy on jour­na­lists, human rights acti­vists, poli­ti­cal oppo­si­tion, and dissi­dents.”

The rese­ar­chers went on to cata­log the frame­works, which they recei­ved from an anony­mous source through Google’s Chrome bug repor­ting program. Each one came with instruc­ti­ons and an archive contai­ning the source code. The frame­works came with the names Heli­co­nia Noise, Heli­co­nia Soft, and Files. The frame­works contai­ned “mature source code capa­ble of deploying exploits for Chrome, Windows Defen­der, and Fire­fox, ” respec­ti­vely.

Inclu­ded in the Heli­co­nia Noise frame­work was code for clea­ning up binary files before they are produ­ced by the frame­work to ensure they don’t contain strings that could incri­mi­nate the deve­lo­pers. As the image of the clea­ning script shows, the list of bad strings inclu­ded “Varis­ton.”

Offi­ci­als from Varis­ton didn’t respond to an email seeking comment for this post.

The frame­works exploi­ted vulne­ra­bi­li­ties that Google, Micro­soft, and Fire­fox fixed in 2021 and 2022. Heli­co­nia Noise inclu­ded both an exploit for the Chrome rende­rer and an exploit for esca­ping the Chrome secu­rity sand­box, which is desig­ned to keep untrus­ted code contai­ned in a protec­ted envi­ron­ment that can’t access sensi­tive parts of an opera­ting system. Because the vulne­ra­bi­li­ties were disco­ve­red inter­nally, there are no CVE desig­na­ti­ons.

Heli­co­nia Noise could be confi­gu­red by the custo­mer to set things like the maxi­mum number of times to serve the exploits, an expi­ra­tion date, and rules specifying when a visi­tor should be consi­de­red a valid target.

Heli­co­nia Soft inclu­ded a booby-trap­ped PDF file that exploi­ted CVE-2021–42298, a bug in the JavaS­cript engine of Micro­soft Defen­der Malware Protec­tion that was fixed in Novem­ber 2021. Simply sending some­one the docu­ment was enough to gain cove­ted system privi­le­ges on Windows because Windows Defen­der auto­ma­ti­cally scan­ned inco­ming files.

The Files frame­work contai­ned a fully docu­men­ted exploit chain for Fire­fox running on Windows and Linux. It exploits CVE-2022–26485, a use-after-free vulne­ra­bi­lity that Fire­fox fixed last March. The rese­ar­chers said Files likely exploi­ted the code-execu­tion vulne­ra­bi­lity since at least 2019, long before it was publicly known or patched. It worked against Fire­fox versi­ons 64 to 68. The sand­box escape Files relied on was fixed in 2019.

The rese­ar­chers pain­ted a picture of an exploit market that’s incre­a­singly out of control. They wrote:

TAG’s rese­arch has shown the proli­fe­ra­tion of commer­cial survei­llance and the extent to which commer­cial spyware vendors have deve­lo­ped capa­bi­li­ties that were previ­ously only avai­la­ble to govern­ments with deep pockets and tech­ni­cal exper­tise. The growth of the spyware industry puts users at risk and makes the Inter­net less safe, and while survei­llance tech­no­logy may be legal under nati­o­nal or inter­na­ti­o­nal laws, they are often used in harm­ful ways to conduct digi­tal espi­o­nage against a range of groups. These abuses repre­sent a seri­ous risk to online safety which is why Google and TAG will conti­nue to take action against, and publish rese­arch about, the commer­cial spyware industry.

Varis­ton joins the ranks of other exploit sellers, inclu­ding NSO Group, Hacking Team, Accu­vant, and Candiru.