Appeared software can penetrate iCloud, Google Drive
Apple, Google, Facebook and Microsoft servers are considered the most stringent security systems in the world. But an Israeli company called NSO Group has announced that its program can infiltrate and steal personal data from the cloud server of these most-used services.
Specifically, the NSO Group's software is called Pegasus, potentially infecting the victim's device and then copying the authentication key of iCloud, Google Drive, Facebook Messenger . services to retrieve data. up there.
Pegasus works by pretending to be a user's device to download data stored on the cloud, stealing access keys, then impersonating Facebook login information or accessing saved messages. on iCloud makes the system suspicious. Pegasus's way of doing this is similar to man-in-the-middle attack.
With this type of attack, the user does not receive any warning when their account is illegally compromised and the system does not request a two-factor authentication. Smart phones, tablets and laptops are all affected by this vulnerability.
The NSO Group spokesperson does not deny the development of such a feature but they claim not to provide any hacking or data collection programs to any government other than law enforcement purposes. and legal intelligence.
Prior to this information, Apple did not deny the existence of tools such as Pegasus, and said such programs could only execute attacks aimed at a small number of devices but could not penetrate data. wide-ranging data.
Microsoft said it would continue to develop security tools for the service, while Amazon and Google said there was no evidence that their servers were violated.
NSO Group has repeatedly used malicious code to infiltrate famous platforms and become a familiar name in the security world. NSO's malware scanned iOS in 2016 and caused Apple to rush to release new updates to prevent it.
In May 2019, NSO launched a new malicious code that could exploit WhatsApp's vulnerability, so this encrypted messaging application could be hijacked with just one phone call.
- Agent Smith code is threatening 25 million Android devices
You should read it
- New weapons against malicious code are 'cloud' computing.
- Amazon AWS server will soon get extortion code, similar to MongoDB
- Microsoft Azure is being used to host malware and C2 servers
- Warning: New malicious code is infecting about 500,000 router devices
- How to turn Raspberry Pi into a personal cloud server
- 14 games on the App Store contain malicious code, iPhone users be careful
- The 3 most popular attacks targeting clouds today
- Learn about Cloud Computing
- Critical error on Apache Struts2 allows hackers to take over the web server
- After WannaCry, Petya's 'extortion' malicious code is raging, this is a remedy to prevent
- Warning: The new Facebook virus, a malicious code that is spreading rapidly through Messenger
- Learn and get used to the cloud - Cloud
Maybe you are interested
How to get data from web into Excel
What information does a VPN hide? How does it protect your data?
How to transfer data between 2 Google Drive accounts
6 Data Collecting Apps You Need to Delete for Better Privacy
How to master numerical data in Google Sheets with the AVERAGE function
How to delete white space in a table in Word - Appears right below the data