Risky Bulletin: FBI extracted Signal chats from iPhone notifications logs
Summary
The FBI has reportedly extracted Signal chat data from an iPhone's notification logs, a method that bypasses Signal's end-to-end encryption by accessing unencrypted data. Separately, leaked police data from Los Angeles, an investigation into a Meta employee for downloading private photos, and a zero-day exploit for Adobe Reader are also highlighted.
IFF Assessment
This is bad news for defenders as it highlights a method to bypass strong encryption by exploiting how operating systems handle notifications and potentially physical access to devices.
Defender Context
This incident underscores the importance of understanding data residualization and how seemingly secure applications can have vulnerabilities exposed through operating system features or other adjacent software. Defenders should be aware of potential exfiltration vectors that don't directly attack the core application's security but rather its interaction with the environment.