<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Surveillance — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/surveillance/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 27 Jan 2024 18:22:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/surveillance/feed.xml" rel="self" type="application/rss+xml"/><item><title>ToTok iOS Application Used for Government Surveillance</title><link>https://feed.craftedsignal.io/briefs/2024-01-totok-spyware/</link><pubDate>Sat, 27 Jan 2024 18:22:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-totok-spyware/</guid><description>The ToTok iOS application, developed by Breej Holding Ltd., was identified as a spying tool used by the government of the United Arab Emirates (UAE) to track users' conversations, movements, and relationships by collecting sensitive user data and transmitting it to servers using self-signed certificates.</description><content:encoded><![CDATA[<p>The ToTok application, developed by Breej Holding Ltd., gained popularity in the United Arab Emirates (UAE) due to the blocking of other VoIP services like Skype and WhatsApp. However, American officials identified ToTok as a spying tool used by the UAE government to track users. The application collects extensive user data, including microphone, calendar, location, photos, contacts, and camera information. This data is transmitted over the network, with traffic primarily routed through the capi.im.totok.ai server. The application&rsquo;s Info.plist reveals it requests permissions for accessing sensitive user information, and uses HTTP, which is atypical for iOS applications, as iOS typically enforces HTTPS only. The application has since been removed from the iOS App Store after these concerns were raised.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>User downloads and installs the ToTok application from the iOS App Store.</li>
<li>The application requests permissions to access microphone, calendar, location, photos, contacts, camera, and Siri integration.</li>
<li>User grants the application permissions to access their data.</li>
<li>The application collects user data, including contacts, location, and communications.</li>
<li>The application transmits collected data to the capi.im.totok.ai server.</li>
<li>Network communications are encrypted via SSL, but the application uses a self-signed certificate, potentially undermining trust.</li>
<li>The UAE government leverages the collected data for surveillance purposes.</li>
<li>The application runs in the background due to UIBackgroundModes, continuously collecting and transmitting data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The ToTok application enabled mass surveillance by the UAE government, impacting tens of thousands of users. User privacy was compromised, with conversations, movements, relationships, appointments, sounds, and images being tracked. The application&rsquo;s ability to run in the background allowed for continuous data collection, and the use of a self-signed certificate raises concerns about the security and integrity of the transmitted data. The removal of the app from the iOS App Store indicates a recognition of the severe security and privacy risks posed by ToTok.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for connections to the domain <code>im.totok.ai</code> and block if found, as this was the primary communication channel (IOC table).</li>
<li>Implement a detection rule to identify applications using self-signed certificates issued from the United Arab Emirates (AE), as observed with the ToTok application (see rule: &ldquo;Detect iOS App Connecting to Host with UAE Self-Signed Certificate&rdquo;).</li>
<li>Develop a Sigma rule to detect iOS applications requesting access to microphone, camera, location, photos, contacts, siri integration, and calendar permissions simultaneously, as this is indicative of potentially malicious data collection (see rule: &ldquo;Detect iOS App Requesting Excessive Permissions&rdquo;).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>spyware</category><category>ios</category><category>surveillance</category><category>totok</category></item></channel></rss>