The digital rights group CitizenLab has discovered a vulnerability that allowed Israeli spyware company NSO Group to implant its Pegasus malware onto virtually every iPhone, Mac, and Apple Watch device.
CitizenLab revealed the vulnerability on Monday, a week after discovering it by analyzing the phone of a Saudi activist that had been infected with the malware. The discovery was announced to the public shortly after Apple rolled out an update to patch the vulnerability.
NEW REPORT
FORCEDENTRY: NSO Group iMessage Zero-Click Exploit captured in the Wildhttps://t.co/IrtsNRVPGS
— Citizen Lab (@citizenlab) September 13, 2021
The vulnerability allowed the NSO Group’s clients to send malicious files disguised as .gif files to a target’s phone, which would then exploit “an integer overflow vulnerability in Apple’s image rendering library” and leave the phone open to the installation of NSO Group’s now-infamous ‘Pegasus’ malware.
The exploit is what’s known as a ‘zero-click’ vulnerability, meaning that the target user would not have to click a suspicious link or file to allow the malware onto their device.
Crucial hearing in Supreme Court today in the #Pegasus cases.
Last week, the Centre had sought time to file affidavit.
A bench led by CJI to hear the cases post 10.30 AM.
Follow this thread for live updates.#pegasussnoopgate pic.twitter.com/8mjV3LK7n4
— Live Law (@LiveLawIndia) September 13, 2021
While most Apple devices were vulnerable, according to the researchers, not all of those afflicted by the spyware were breached in this way. Instead, NSO Group sold the use of its malware to clients around the world, who used the tool to spy on the phones of rival politicians, journalists, activists, and business leaders.
News of the malware’s existence was first broken earlier this summer by Amnesty International and Forbidden Stories, a French investigative outlet, and reported by a collection of partner news outlets. Among those accused of using the Israeli malware are the governments of Azerbaijan, Bahrain, Kazakhstan, Mexico, Morocco, Rwanda, Saudi Arabia, Hungary, India, and the United Arab Emirates (UAE).
BIG NEWS: Do you own an Apple product? UPDATE IT NOW. New zero-click NSO Group #Pegasus spyware has been infecting iPhones, Macs, Watches. This is the Holy Grail of surveillance capabilities and you are vulnerable until you update. https://t.co/GktK822Zo2
— Nicole Perlroth (@nicoleperlroth) September 13, 2021
A leaked list suggested that as many as 52,000 names were marked as possible targets for surveillance by NSO Group’s customers, and roughly a tenth of these targets were reportedly surveilled. Pegasus granted users access to calls, messages, photos and files, and allowed them to secretly turn on the target phones’ cameras and microphones.
CitizenLab pinned the latest exploit on NSO Group after discovering a so-called ‘digital artifact’ left behind that matched calling cards left by the company’s other exploits, and similarly-named processes in its code.
.@RahulGandhi had rightly said that #Pegasus snooping is an issue of TREASON. The Govt cannot cite 'national security' and run away from questions, scrutiny. pic.twitter.com/qtm7a46Zhw
— Ruchira Chaturvedi (@RuchiraC) September 13, 2021
The NSO Group has not commented on CitizenLab’s latest research, which comes just one day before Apple’s anticipated unveiling of the iPhone 13 ahead of its launch later this month.
(RT.com, PC, Social Media)
The post The ‘Pegasus’ Saga: All iPhone Devises Were Exploited by Israeli Spy Tech Firm, Report Indicates appeared first on Palestine Chronicle.