Apple patches exploit attributed to Pegasus

It was the first time a so-called “zero-click” exploit had been caught and analysed, said the researchers, who found the malicious code on Sept. 7 and immediately alerted Apple

September 14, 2021 04:21 am | Updated 12:44 pm IST - Boston

An Apple logo hangs above the entrance to the Apple store on 5th Avenue in the Manhattan borough of New York City. File

An Apple logo hangs above the entrance to the Apple store on 5th Avenue in the Manhattan borough of New York City. File

Apple released an emergency software patch to fix a security vulnerability that researchers said could allow hackers to directly infect Apple devices without any user action.

The researchers at the University of Toronto’s Citizen Lab said the flaw allowed Pegasus spyware from the world’s most infamous hacker-for-hire firm, NSO Group, to directly infect the iPhone of a Saudi activist.

The flaw affected all Apple’s operating systems, the researchers said.

It was the first time a so-called “zero-click” exploit had been caught and analysed, said the researchers, who found the malicious code on Sept. 7 and immediately alerted Apple. They said they had high confidence the Israeli company NSO Group was behind the attack, adding that the targeted activist asked to remain anonymous.

“We’re not necessarily attributing this attack to the Saudi government,” said researcher Bill Marczak.

Although Citizen Lab previously found evidence of zero-click exploits being used to hack into the phones of al-Jazeera journalists and other targets, “this is the first one where the exploit has been captured so we can find out how it works,” said Mr. Marczak.

Although security experts say that average iPhone, iPad and Mac user generally need not worry — such attacks are highly targeted — the discovery still alarmed security professionals.

A malicious image file was transmitted to the activist’s phone via the iMessage instant-messaging app before it was hacked with NSO’s Pegasus spyware, which opens a phone to eavesdropping and remote data theft, Mr. Marczak said. It was discovered during a second examination of the phone, which forensics showed had been infected in March.

NSO Group did not immediately respond to an email seeking comment.

0 / 0
Sign in to unlock member-only benefits!
  • Access 10 free stories every month
  • Save stories to read later
  • Access to comment on every story
  • Sign-up/manage your newsletter subscriptions with a single click
  • Get notified by email for early access to discounts & offers on our products
Sign in

Comments

Comments have to be in English, and in full sentences. They cannot be abusive or personal. Please abide by our community guidelines for posting your comments.

We have migrated to a new commenting platform. If you are already a registered user of The Hindu and logged in, you may continue to engage with our articles. If you do not have an account please register and login to post comments. Users can access their older comments by logging into their accounts on Vuukle.