Advertisement

We need your help now

Support from readers like you keeps The Journal open.

You are visiting us because we have something you value. Independent, unbiased news that tells the truth. Advertising revenue goes some way to support our mission, but this year it has not been enough.

If you've seen value in our reporting, please contribute what you can, so we can continue to produce accurate and meaningful journalism. For everyone who needs it.

Alamy

Apple issues emergency security update for all of its users following 'zero-click' hack

The flaw affected all Apple’s operating systems, researchers said.

APPLE HAS RELEASED an emergency software patch to fix a security vulnerability that researchers said could allow hackers to directly infect iPhones and other devices without any user action.

The researchers at the University of Toronto’s Citizen Lab said the flaw allowed spyware from the world’s most infamous hacker-for-hire firm, NSO Group, to directly infect the iPhone of a Saudi activist.

The flaw affected all Apple’s operating systems, the researchers said.

It was the first time a so-called “zero-click” exploit had been caught and analysed, said the researchers, who found the malicious code on September 7 and immediately alerted Apple.

They said they had high confidence the Israeli company NSO Group was behind the attack, adding that the targeted activist asked to remain anonymous.

“We’re not necessarily attributing this attack to the Saudi government,” said researcher Bill Marczak.

Although Citizen Lab previously found evidence of zero-click exploits being used to hack into the phones of al-Jazeera journalists and other targets, “this is the first one where the exploit has been captured so we can find out how it works”, said Marczak.

Although security experts say that average iPhone, iPad and Mac user generally need not worry — such attacks tend to be highly targeted — the discovery still alarmed security professionals.

Malicious image files were transmitted to the activist’s phone via the iMessage instant-messaging app before it was hacked with NSO’s Pegasus spyware, which opens a phone to eavesdropping and remote data theft, Marczak said.

It was discovered during a second examination of the phone, which forensics showed had been infected in March. He said the malicious file causes devices to crash.

NSO Group did not immediately respond to an email seeking comment.

In a blog post, Apple said it was issuing a security update for iPhones and iPads because a “maliciously crafted” PDF file could lead to them being hacked.

It said it was aware that the issue may have been exploited and cited Citizen Lab. Apple did not immediately respond to questions regarding whether this was the first time it had patched a zero-click.

Citizen Lab called the iMessage exploit FORCEDENTRY and said it was effective against Apple iOS, MacOS and WatchOS devices.

Researcher John Scott-Railton said the news highlights the importance of securing popular messaging apps against such attacks.

“Chat apps are increasingly becoming a major way that nation-states and mercenary hackers are gaining access to phones,” he said. “And it’s why it’s so important that companies focus on making sure that they are as locked down as possible.”

The researchers said it also exposes — again — that NSO’s business model involves selling spyware to governments that will abuse it, not just to law enforcement officials chasing cyber criminals and terrorists, as NSO claims.

“If Pegasus was only being used against criminals and terrorists, we never would have found this stuff,” said Mr Marczak.

Facebook’s WhatsApp was also allegedly targeted by an NSO zero-click exploit. In October 2019, Facebook sued NSO in US federal court for allegedly targeting some 1,400 users of the encrypted messaging service with spyware.

In July, a global media consortium published a damning report on how clients of NSO Group have been spying for years on journalists, human rights activists, political dissidents — and people close to them, with the hacker-for-hire group directly involved in the targeting.

Amnesty International said it confirmed 37 successful Pegasus infections based on a leaked targeting list whose origin was not disclosed.

One involved the fiancee of Washington Post journalist Jamal Khashoggi, just four days after he was killed in the Saudi Consulate in Istanbul in 2018. The CIA attributed the murder to the Saudi government.

Readers like you are keeping these stories free for everyone...
A mix of advertising and supporting contributions helps keep paywalls away from valuable information like this article. Over 5,000 readers like you have already stepped up and support us with a monthly payment or a once-off donation.

View 16 comments
Close
16 Comments
This is YOUR comments community. Stay civil, stay constructive, stay on topic. Please familiarise yourself with our comments policy here before taking part.
Leave a Comment
    Submit a report
    Please help us understand how this comment violates our community guidelines.
    Thank you for the feedback
    Your feedback has been sent to our team for review.

    Leave a commentcancel

     
    JournalTv
    News in 60 seconds