Posted on 09/13/2021 3:59:41 PM PDT by American Number 181269513
Apple released an emergency software update Monday after it discovered a vulnerability that would allow hackers to infect iPhones, iPads, Apple computers and watches without a user even clicking a malicious link. The spyware detected could open up an Apple device to data theft and eavesdropping.
The flaw was detected by researchers at the University of Toronto’s Citizen Lab, who noticed spyware from the world’s most infamous hacker-for-hire firm, NSO Group, had infected the iPhone of a Saudi activist.
It was the first time a so-called “zero-click” exploit had been caught and analyzed, said the researchers, who found the malicious code on Sept. 7 and immediately alerted Apple. They said they had high confidence the Israeli company NSO Group was behind the attack, adding that the targeted activist asked to remain anonymous.
The flaw discovered by Citizen Lab affected all of Apple’s operating systems, the researchers said. Although security experts say that average iPhone, iPad and Mac user generally need not worry — such attacks tend to be highly targeted.
Still, Apple said in a blog post it was issuing a security update for iPhones and iPads because a “maliciously crafted” PDF file could lead to them being hacked. It said it was aware that the issue may have been exploited and cited Citizen Lab.
Users are encouraged to check if they have automatic software updates enabled in their devices’ settings. If not, they should consider running the update manually.
“Do you own an Apple product? Update it today,” John Scott-Railton, a researcher at Citizen Lab, told the New York Times.
Malicious image files were transmitted to the activist’s phone via the iMessage instant-messaging app before it was hacked with NSO’s Pegasus spyware, which then opens a phone to eavesdropping and remote data theft, Marczak said. It was discovered during a second examination of the phone, which forensics showed had been infected in March. He said the malicious file causes devices to crash.
NSO Group did not immediately respond to an email seeking comment.
Researcher John Scott-Railton said the news highlights the importance of securing popular messaging apps against such attacks. “Chat apps are increasingly becoming a major way that nation-states and mercenary hackers are gaining access to phones,” he said. “And it’s why it’s so important that companies focus on making sure that they are as locked down as possible.”
The researchers said the discovery also exposes — again — that NSO’s business model involves selling spyware to governments that will abuse it, not just to law enforcement officials chasing cybercriminals and terrorists, as NSO claims.
“If Pegasus was only being used against criminals and terrorists, we never would have found this stuff,” said Citizen Lab researcher Bill Marczak
Facebook’s WhatsApp was also allegedly targeted by an NSO zero-click exploit In October 2019, Facebook sued NSO in U.S. federal court for allegedly targeting some 1,400 users of the encrypted messaging service with spyware.
In July, a global media consortium published a damning report on how clients of NSO Group have been spying for years on journalists, human rights activists, political dissidents — and people close to them, with the hacker-for-hire group directly involved in the targeting.
I keep my automatic updates off.
>> average iPhone, iPad and Mac user generally need not worry — such attacks tend to be highly targeted.
Lemme guess... the target is the unvaxed!!!
Just went to APL updates.
“None Available”
Thanks,
Just updated iPhone and iPad.
If you want privacy, get a dog and toss the phone!
There was one for my iPhone.
Only an iMac here
High Siera 10.13.6
Probably no longer supported
Ha! A good one.
Heard of this?
Pinging Swordmaker
NSO doing our government’s work.
New spyware?
P
HMMMM....interesting timing...
I saw thi earlier. Updated both phone and pad and good to go.
“hacker-for-hire” firm? Hacking should be a capital offense. Get caught, you die. No exceptions, no excuses. Same for people who fund virus creation.
Methinks such should be subject to “Letters of Marque and Reprisal” per the Constitution. The malicious aren’t worth federal involvement, but private citizens should petition Congress for, and receive, permission to wage literal war on the perpetrators.
If you want on or off the Apple/Mac/iOS Ping List, Freepmail me.
Have you updated all of your Apple devices?
(Just curious :)
There’s some security updates for MacOS Catalina and BigSur and Safari Mojave as well for non-M series processor Macs… so check for your Mac in the Apple Menu under Software Update.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.