Detect spyware that infects iMessage even if the user has not read the message
This spyware is developed by the Israeli company NSO Group, a private company specializing in selling high-end hacking tools whose customers include governments in many countries. As reported by Amnesty International and 17 other newspapers, NSO Group's Pegasus software was used by these customers to hack into the phones of at least 37 journalists, activists, politicians, and journalists. business leaders around the world. NSO Group denies this allegation, and asserts that the report contains many serious false content as well as lack of credible evidence.
According to a report by Amnesty International, the method they use to analyze the phones of the targeted victims, thereby detecting whether they have been tampered with by the Pegasus software. The organization found evidence of a type of iMessage attack called "zero-click", which has been targeting journalists since 2018, and this shows the alarming security of the phone line. iPhones from Apple. This type of zero-click attack does not require any interaction on the part of the victim to break into their phone!
Amnesty says it analyzed a fully updated iPhone 12, belonging to an Indian journalist, with signs of tampering following a June 16 zero-click attack. .
"These latest findings show that NSO Group customers can now remotely interfere with any iPhone model and any recent iOS version," the report said.
Bill Marczak, a researcher at the University of Toronto's Citizen Lab specializing in digital surveillance, posted on Twitter that his lab had also found evidence of zero-click messaging attacks being used to Break into the latest iPhone models.
Marczak said that some such attacks focus on exploiting Apple's ImageIO vulnerability, which allows Apple devices to read and display images.
Amnesty also found evidence of a zero-click attack targeting an Azerbaijani journalist in 2020, but related to Apple Music. Accordingly, their analysts could not be sure whether Apple Music was used to infect phones with spyware, or if the spyware came from another application. The organization has also reported the results to Apple and hopes the company will study the matter more closely.
According to Amnesty, NSO Group customers have previously used a series of attacks to send malicious links to victims, and victims' devices were only infected after they had clicked on the link.
As for Apple, the company asserts that the iPhone remains one of the safest consumer devices on the planet.
"The attacks described above are very sophisticated, cost millions of dollars to develop, often have a short lifecycle, and are used to target specific individuals" - chief security engineer of Apple, Ivan Krstic, said, adding that Apple has always prioritized security updates, and that the vast majority of users are not at risk of such attacks.
NSO Group says its software is used to fight terrorism and crime. The company also says that once the products are sold to customers, they will not operate them and have no information on how they are deployed.
Previously, NSO Group was accused of facilitating device hacks of journalists. Facebook sued NSO Group in October 2019 on the grounds that the company's tools were used to hack WhatsApp accounts of journalists, politicians, social activists. Asking the hacker to call the victim's WhatsApp is enough to hack their phone!
You should read it
- The dangers of spyware on iPhone
- How to use iMessage on iPhone
- Common iMessage errors and how to fix it
- 10 new things you can do on the iMessage app
- How to fix cannot log in to iMessage on Mac
- The appearance of malicious code makes iMessage on iPhone be stifled and remedied
- How to increase security for iMessage iPhone / iPad messages
- These are fascinating changes on iMessage iOS 11
May be interested
- Fool Windows Hello with a fake camerathe ability to support webcams integrated with infrared (ir) of many companies on windows hello creates an opening for hackers to attack.
- Discover more ways to attack the printing system in Windowson july 15, benjamin delpy, security researcher and innovator at mimikatz, revealed how to abuse the usual windows printer driver installation method to gain system local privileges through a malicious printer driver. .
- Steps to recover data eaten by virus in USB 2021recover data eaten by virus in usb. if your usb is hidden by a virus, try the following ways to restore it.
- Signs that your computer is infected with malwaremalware, also known as malware, is harmful files, they often come from installing pirated software or you unintentionally download them from the internet. to detect malicious code on your computer, you need to carefully check everything on your computer.
- How do websites protect your passwords?how do websites store your passwords? how do they keep your logins secure? and what is the most secure method websites can use to track your passwords?
- PrintNightMare vulnerability patch is flawed, attackers can still 'break through'yesterday, microsoft released a patch for the printnightmare zero-day vulnerability. this bug allows attackers to remotely execute code on fully patched print spooler devices.