Jump to content
  • Apple hits the alarm with multi-OS emergency update to patch zero-click flaw

    Karlston

    • 436 views
    • 3 minutes
     Share


    • 436 views
    • 3 minutes

    The company on Monday pushed out emergency security updates for iOS, macOS, and its other operating systems to plug a hole that threatened security on a range of devices.

    Apple on Monday issued emergency security updates for iOS, macOS and its other operating systems to plug a hole that Canadian researchers claimed had been planted on a Saudi political activist's device by NSO Group, an Israeli seller of spyware and surveillance software to governments and their security agencies.

     

    Updates to patch the under-active-exploit vulnerability were released for iOS 14; macOS 11 and 10, aka Big Sur and Catalina, respectively; iPad OS 14; and watchOS 7.

     

    According to Apple, the vulnerability can be exploited by "processing a maliciously crafted PDF," which "may lead to arbitrary code execution." The phrase "arbitrary code execution" is Apple's way of saying that the bug was of the most serious nature; Apple does not rank threat level of vulnerabilities, unlike operating system rivals such as Microsoft and Google.

     

    Apple credited The Citizen Lab for reporting the flaw.

     

    Also on Monday, Citizen Lab, a cybersecurity watchdog organization that operates from the Munk School of Global Affairs & Public Policy at the University of Toronto, released a report outlining what it found. "While analyzing the phone of a Saudi activist infected with NSO Group's Pegasus spyware, we discovered a zero-day zero-click exploit against iMessage," Citizen Lab researchers wrote.

     

    The exploit, which Citizen Lab dubbed "FORCEDENTRY," had been used to infect the phone of the activist — and possibly others as far back as February 2021 — with the NGO Group's "Pegasus" surveillance suite. It, in turn, consists largely of spyware that can document texts and emails sent to and from the device as well as switch on its camera and microphone for secret recording.

    Citizen Lab was confident that FORCEDENTRY was associated with Pegasus and thus, NGO Group. According to researchers, the spyware loaded by the zero-click exploit contained coding characteristics, including ones never made public, that Citizen Lab had come across in previous analysis of NGO Group and Pegasus.

     

    "Despite promising their customers the utmost secrecy and confidentiality, NSO Group's business model contains the seeds of their ongoing unmasking," Citizen Labs' researcher wrote in their Monday report. "Selling technology to governments that will use the technology recklessly in violation of international human rights law ultimately facilitates discovery of the spyware by investigatory watchdog organizations."

    Apple device owners can download and install the security-only updates issued Monday by triggering a software update through the device's OS.

     

     

    Apple hits the alarm with multi-OS emergency update to patch zero-click flaw

     

    (May require free registration to view)


    User Feedback

    Recommended Comments

    There are no comments to display.



    Join the conversation

    You can post now and register later. If you have an account, sign in now to post with your account.
    Note: Your post will require moderator approval before it will be visible.

    Guest
    Add a comment...

    ×   Pasted as rich text.   Paste as plain text instead

      Only 75 emoji are allowed.

    ×   Your link has been automatically embedded.   Display as a link instead

    ×   Your previous content has been restored.   Clear editor

    ×   You cannot paste images directly. Upload or insert images from URL.


  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...