Skip to main content

Apple condemns Pegasus spyware attack, says it is working on added protection

 Apple condemns Pegasus spyware attack, says it is working on added protection.. 

Apple has also noted that such attacks do not affect an overwhelming number of users and has said that the company is now working on added protections.


HIGHLIGHTS

  1. According to the forensic methodology report by Amnesty, Apple’s iPhone is the easiest to snoop on using the Pegasus software.
  2. Apple called such attacks “highly sophisticated, cost millions of dollars to develop, often have a short shelf life, and are used to target specific individuals.”
  3. The leaked database shows that iPhones running iOS 14.6 contain a zero-click iMessage exploit and this exploit could have been used to install Pegasus software

Apple, the tech giant which emphasises user privacy, was a victim of Pegasus spyware attack that snooped on journalists, activists and some government officials. In fact, according to the forensic methodology report by Amnesty, Apple’s iPhone is the easiest to snoop on using the Pegasus software. The leaked database shows that iPhones running iOS 14.6 contain a zero-click iMessage exploit and this exploit could have been used to install Pegasus software on the iPhone devices of the targeted entities. The Cupertino giant has now released a statement condemning the attack. It has also noted that such attacks do not affect an overwhelming number of users and has noted that the company is now working on added protections.

Apple’s Head of Security Engineering and Architecture, Ivan Krsti, in a statement said, "Attacks like the ones described are highly sophisticated, cost millions of dollars to develop, often have a short shelf life, and are used to target specific individuals. While that means they are not a threat to the overwhelming majority of our users, we continue to work tirelessly to defend all our customers, and we are constantly adding new protections for their devices and data. While that means they are not a threat to the overwhelming majority of our users, we continue to work tirelessly to defend all our customers, and we are constantly adding new protections for their devices and data,” the Apple spokesperson added.A report by Amnesty International, a global organisation which is dedicated to fighting the abuse of human rights noted that the spyware can work on any smartphone, and discovered that it was still using the iMessage exploit that was previously thought to have been fixed.

This exploit was discovered by Citizen Labs previously. Zero click attacks do not require input from the user to trigger, are virtually undetectable, and run in the background. Apple had introduced a Blastdoor framework in iOS 14 to make zero clock attacks difficult but it does not seem to be working as intended as researcher Bill Marczac.

“AmnestyTech saw an iOS 14.6 device hacked with a zero-click iMessage exploit to install Pegasus. We at @citizenlab also saw 14.6 devices hacked with a zero-click iMessage exploit to install Pegasus. All this indicates that NSO Group can break into the latest iPhones,” Marczac wrote on Twitter. “It also indicates that Apple has a MAJOR blinking red five-alarm-fire problem with iMessage security that their BlastDoor Framework (introduced in iOS 14 to make zero-click exploitation more difficult) ain't solving,” he added

Comments

Popular posts from this blog

EDGE COMPUTING

EDGE COMPUTING Timeline of Computing The timeline of computing looks something like this: At first, there was one big computer; after that came the UNIX era; then we were introduced to personal computers, which led to the cloud computing era. And now, we find ourselves in the next stage of computing, named the Edge computing era. Nowadays we use our personal computers to access centralized services such as Gmail, Google Drive, cloud storage, office 365… The personal assistants on our smartphones and smart speakers are powered by centralized cloud artificial intelligence. We can say with certainty that the new opportunities of cloud services are located at the “EDGE.” Even though we are still in the cloud computing era – we can say that our cloud infrastructure relies much on hosting companies and compute power of the very few who are providing it for us: Amazon, Microsoft, IBM, and Google. Why do we call it Edge? The word Edge is used in the context of geographic distribution. Edge com...

RECODE

 Recode Founder: Kara Swisher Year Started: 2014 Domain Authority: 93 Currently, owned by VOX media, Recode gives the most updated independent technology news, analysis trends, and reviews from the most respected and informed journalists as well as bloggers in media and technology. Recode is uncovering and explaining how our tech world is changing by focusing on the businesses of Silicon Valley. Its founder Kara Swisher has all the connections to the latest tech tips and products, making it a robust technology blog to read!  

INTERNET OF THINGS (IOT)

  Internet of Things (IoT) Another promising new technology trend is IoT. Many “things” are now being built with WiFi connectivity, meaning they can be connected to the Internet—and to each other. Hence, the Internet of Things, or IoT. The Internet of Things is the future, and has already enabled devices, home appliances, cars and much more to be connected to and exchange data over the Internet. As consumers, we’re already using and benefitting from IoT. We can lock our doors remotely if we forget to when we leave for work and preheat our ovens on our way home from work, all while tracking our fitness on our Fitbits. However, businesses also have much to gain now and in the near future. The IoT can enable better safety, efficiency and decision making for businesses as data is collected and analyzed. It can enable predictive maintenance, speed up medical care, improve customer service, and offer benefits we haven’t even imagined yet. And we’re only in the beginni...