Skip to main content

Apple condemns Pegasus spyware attack, says it is working on added protection

 Apple condemns Pegasus spyware attack, says it is working on added protection.. 

Apple has also noted that such attacks do not affect an overwhelming number of users and has said that the company is now working on added protections.


HIGHLIGHTS

  1. According to the forensic methodology report by Amnesty, Apple’s iPhone is the easiest to snoop on using the Pegasus software.
  2. Apple called such attacks “highly sophisticated, cost millions of dollars to develop, often have a short shelf life, and are used to target specific individuals.”
  3. The leaked database shows that iPhones running iOS 14.6 contain a zero-click iMessage exploit and this exploit could have been used to install Pegasus software

Apple, the tech giant which emphasises user privacy, was a victim of Pegasus spyware attack that snooped on journalists, activists and some government officials. In fact, according to the forensic methodology report by Amnesty, Apple’s iPhone is the easiest to snoop on using the Pegasus software. The leaked database shows that iPhones running iOS 14.6 contain a zero-click iMessage exploit and this exploit could have been used to install Pegasus software on the iPhone devices of the targeted entities. The Cupertino giant has now released a statement condemning the attack. It has also noted that such attacks do not affect an overwhelming number of users and has noted that the company is now working on added protections.

Apple’s Head of Security Engineering and Architecture, Ivan Krsti, in a statement said, "Attacks like the ones described are highly sophisticated, cost millions of dollars to develop, often have a short shelf life, and are used to target specific individuals. While that means they are not a threat to the overwhelming majority of our users, we continue to work tirelessly to defend all our customers, and we are constantly adding new protections for their devices and data. While that means they are not a threat to the overwhelming majority of our users, we continue to work tirelessly to defend all our customers, and we are constantly adding new protections for their devices and data,” the Apple spokesperson added.A report by Amnesty International, a global organisation which is dedicated to fighting the abuse of human rights noted that the spyware can work on any smartphone, and discovered that it was still using the iMessage exploit that was previously thought to have been fixed.

This exploit was discovered by Citizen Labs previously. Zero click attacks do not require input from the user to trigger, are virtually undetectable, and run in the background. Apple had introduced a Blastdoor framework in iOS 14 to make zero clock attacks difficult but it does not seem to be working as intended as researcher Bill Marczac.

“AmnestyTech saw an iOS 14.6 device hacked with a zero-click iMessage exploit to install Pegasus. We at @citizenlab also saw 14.6 devices hacked with a zero-click iMessage exploit to install Pegasus. All this indicates that NSO Group can break into the latest iPhones,” Marczac wrote on Twitter. “It also indicates that Apple has a MAJOR blinking red five-alarm-fire problem with iMessage security that their BlastDoor Framework (introduced in iOS 14 to make zero-click exploitation more difficult) ain't solving,” he added

Comments

Popular posts from this blog

Twitter Gets ‘One Last Notice’ from Government to Comply With New IT Rules

 Twitter Gets Government says the last notice to Twitter is a gesture of goodwill and failure to adhere will lead to consequences. HIGHLIGHTS Twitter has been warned by the government over new IT rules The platform is yet to appoint grievances officers in the country IT ministry brought its new regulations into place on May 2 Citing non-compliance of New Intermediary Guideline Rules by Twitter, the Union Ministry of Electronics and Information Technology (MeitY) on Saturday sent a final communication to Twitter asking them to comply immediately with the requirements of the new guidelines failing which resultant consequences as enjoined in the law shall follow. A letter issued by the Ministry to the social media platform stated that the New Intermediary Guideline Rules have become effective from May 26. After expiry of three-month period given to social media intermediaries for compliance, Twitter is yet to appoint India based Chief Compliance Officer, Nodal Contact P...

CNET

  CNET Founder:  Halsey Minor, Shelby Bonnie Year Started:  1994 Domain Authority:  93 Following the latest trends in consumer technology with steadfast precision,  CNET  is one of the top technology blogs you can find on this list. CNET stays ahead of the curve by spreading its hands on all sorts of incredible tech products, trends and offering unbiased reviews. It offers trusty guides, instructional videos, and up-to-the-minute news on everything from technology to sports. Especially, when considering to buy a new gadget, CNET should be your first stop to provide a genuine review, pricing, making it one of the best technology blogs to check out.  

WE HAVE NO REASON TO BELIEVE 5G IS SAFE

We Have No Reason to Believe 5G Is Safe The technology is coming, but contrary to  what some people say  there could be health risks The telecommunications industry and their experts have accused many scientists who have researched the effects of cell phone radiation of "fear mongering" over the advent of wireless technology's 5G. Since much of our research is publicly-funded, we believe it is our ethical responsibility to inform the public about what the peer-reviewed scientific literature tells us about the health risks from wireless radiation. The chairman of the Federal Communications Commission (FCC) recently announced through a press release that the commission will soon reaffirm the radio frequency radiation (RFR) exposure limits that the FCC adopted in the late 1990s. These limits are based upon a behavioral change in rats exposed to microwave radiation and were designed to protect us from short-term heating risks due to RFR exposure.   Y...