HomeCII/OTZero-Click iPhone Exploit Deploys Spyware on Russian Journalist in Exile

Zero-Click iPhone Exploit Deploys Spyware on Russian Journalist in Exile

Published on

spot_img

A recent report has once again shed light on the numerous methods employed by governments and law enforcement agencies to deploy the invasive Pegasus spyware on targeted devices. The focus of this latest revelation is award-winning Russian journalist Galina Timchenko, who received a threat notification from Apple warning her that her iPhone was likely the target of a state-sponsored attack.

Timchenko, who is currently exiled in Latvia and co-founded a Russian-English news site called Meduza, sought assistance from the University of Toronto’s Citizen Lab to understand the nature of the threat. Citizen Lab, renowned for their investigations into digital espionage, analyzed the forensics artifacts from Timchenko’s phone and discovered that Pegasus had been installed on it in February.

Both Citizen Lab and Access Now, a nonprofit organization advocating for human rights in the digital age, collaborated on the investigation and released separate reports on the incident. According to Citizen Lab, the infection was likely achieved through a zero-click exploit known as PWNYOURHOME, which targets Apple’s HomeKit and iMessage. However, neither organization attributed the attack to any specific nation-state actor.

PWNYOURHOME is one of three iOS 15 and iOS 16 zero-click exploits previously identified by Citizen Lab as being used by NSO Group’s clients to deploy Pegasus on target iPhones. This particular exploit targets the HomeKit functionality before breaching device protections and enabling Pegasus delivery through iMessage. The other two exploits, FINDMYPWN and LatentImage, target the iPhone’s Find My feature.

These exploits are part of a growing number of attacks targeting iPhone users. Just this month, Citizen Lab reported the discovery of two no-click zero-day vulnerabilities in iOS 16.6, referred to as Blastpass, which allowed for the delivery of Pegasus without any user interaction. The organization urged iPhone users to promptly update their devices to protect against these vulnerabilities.

This incident follows previous discoveries of vulnerabilities in iOS that were actively exploited by threat actors. Kaspersky, for example, uncovered a multiyear spying campaign on iOS users earlier this year, in which a nation-state actor used up to three zero-days to compromise target devices. However, there is currently no evidence to suggest that NSO Group’s clients exploited these vulnerabilities to deploy Pegasus.

The abundance of exploits and vulnerabilities within the iOS environment raises concerns about the potential access adversaries have to spyware like Pegasus. Meduza, in its report on the incident, stated that the spyware likely provided the perpetrator access to sensitive information on Timchenko’s iPhone, including corporate passwords, correspondence, and the identities of individuals collaborating with the news site in Russia.

Pegasus, developed and sold by Israeli firm NSO Group, is a controversial surveillance tool that enables customers to extract various data from targeted devices. Once installed, Pegasus can intercept and transmit messages, emails, media files, passwords, and precise location information. The spyware employs advanced techniques to evade detection by antivirus and threat detection tools.

NSO Group maintains that it only sells the technology to authorized agencies for legitimate crime-fighting and surveillance purposes. However, critics argue that Pegasus enables governments, particularly those with poor human rights records, to spy on and silence journalists, dissidents, activists, and political opponents. A leaked database in 2021 revealed that NSO Group clients had selected over 50,000 phone numbers for surveillance, including those of 180 journalists and numerous individuals involved in human rights work.

The cost associated with accessing Pegasus is also a cause for concern. A senior researcher at Citizen Lab mentioned that NSO Group clients typically spend tens of millions of dollars, if not more, to gain access to the spyware.

The incident involving Galina Timchenko highlights the continued threat posed by Pegasus and the urgent need for improved cybersecurity measures to protect individuals and organizations from state-sponsored surveillance. With the ever-increasing number of exploits and vulnerabilities in mobile devices, it is crucial for users to remain vigilant and keep their devices updated with the latest security patches to mitigate the risk of falling victim to such attacks.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...