Tuesday, September 14, 2021

Israeli spy tech firm exploited vulnerability on ALL IPHONE devices to implant 'Pegasus' malware – report

Editor's note: If readers want to know how it came about Israel had access to Apple's iPhones, our Talpiot archive and Talpiot page should direct you sufficiently to come to your own conclusions as to the national security threat Israel poses to nations. How many influential and powerful people were compromised by this "exploited vulnerability?" The RT New article goes on to say that an estimated 52,000 names were "marked as targets."
________  

Source: RT News
FILE PHOTO: A 3D printed Apple logo is seen in front of a displayed cyber code in this illustration taken March 22, 2016 © Reuters / Dado Ruvic 

Digital rights group CitizenLab has discovered a vulnerability that allowed Israeli spyware company NSO Group to implant its Pegasus malware onto virtually every iPhone, Mac, and Apple Watch device.
CitizenLab revealed the vulnerability on Monday, a week after discovering it by analyzing the phone of a Saudi activist that had been infected with the malware. The discovery was announced to the public shortly after Apple rolled out an update to patch the vulnerability.

The vulnerability allowed the NSO Group's clients to send malicious files disguised as .gif files to a target's phone, which would then exploit "an integer overflow vulnerability in Apple's image rendering library" and leave the phone open to the installation of NSO Group's now-infamous 'Pegasus' malware.

More: French finance minister says Pegasus spyware may have infected govt devices, including his own phone

The exploit is what's known as a 'zero-click' vulnerability, meaning that the target user would not have to click a suspicious link or file to allow the malware onto their device.

While most Apple devices were vulnerable, according to the researchers, not all of those afflicted by the spyware were breached in this way. Instead, NSO Group sold the use of its malware to clients around the world, who used the tool to spy on the phones of rival politicians, journalists, activists, and business leaders.

News of the malware's existence was first broken earlier this summer by Amnesty International and Forbidden Stories, a French investigative outlet, and reported by a collection of partner news outlets. Among those accused of using the Israeli malware are the governments of Azerbaijan, Bahrain, Kazakhstan, Mexico, Morocco, Rwanda, Saudi Arabia, Hungary, India, and the United Arab Emirates (UAE).

Please go to RT News to read more.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.

Looking into our circumstances...