News iPhones of US diplomats hacked using 0-click exploits from embattled NSO (1 Betrachter)

  • Ersteller des Themas
  • #1

deviantx69

Registriert
Black-Market: 0 / 0 / 0
4 Dezember 2021
2
2 %
The iPhones of nine US State Department officials were infected by powerful and stealthy malware developed by NSO Group, the Israeli exploit seller that has come under increasing scrutiny for selling its wares to customers who in turn use it to spy on journalists, lawyers, activists, and US allies.



The US officials, either stationed in Uganda or focusing on issues related to that country, received warnings like this one from Apple informing them their iPhones were being targeted by hackers. Citing unnamed people with knowledge of the attacks, Reuters said the hackers used software from NSO.

No clicking required

As previously reported, NSO software known as Pegasus uses exploits sent through messaging apps that infect iPhones and Android devices without requiring targets to click links or take any other action. From there, the devices run hard-to-detect malware that can download photos, contacts, text messages, and other data. The malware also allows the operator to listen to audio and view video in real time.

NSO has long come under fire for selling its wares to governments hostile to journalists and dissidents. Facebook sued NSO in 2019 after Pegasus was discovered to have used the company's WhatsApp to infect the iPhones of 36 journalists. Last month, Apple sued NSO after learning Pegasus infected 37 iPhones belonging to journalists, human rights activists, and business executives. Critics said the targets didn't meet the criteria NSO says is required for its powerful spyware to be used. Also last month the Biden administration's Commerce Department blocked the export, re-export and in-country transfer of NSO technology.
 

Dieses Thema betrachten gerade (Benutzer: 0, Gäste: 1)