IPhone researchers have been vulnerable to hacking for several months

For nearly a year, the spyware sold by the Israeli NSO group was allegedly armed with piercing weapons such as, Zero footprint "This means installing those programs without any user intervention and accessing files and data and harnessing them to the hacker," and a weapon The click is zero "This means browsing without any clicks. Just point to the place and it will go to it immediately." And the zero day “This means an attack without waiting, which is the exploitation of weaknesses in the software, and its security flaws.” Indeed, a similar vulnerability was used in iMessage to take over the iPhone. This means that it did not leave any visual trace of placing it on the target's phones, and it can be installed simply by sending a message without the need to click on it, and this vulnerability works even on iPhones that were running the latest version of iOS. What is this company's comment on the allegations? And what was Apple's response?


Researchers at the Citizen Lab at the University of Toronto said they discovered the alleged hacking tool, dubbed "Kismet." And if Kismet can be thought of as a "Trojan" or Trojan horse, it has been used to bypass the security of the iPhone, and the Soldiers on the Horse are another package of software sold by the NSO group, called Pegasus, which is frighteningly powerful, according to allegations. Citizen Lab.

The researchers said, "We believe, at least, that this version of the Pegasus spy program has the ability to track the location and access the passwords and credentials stored on the phone and record audio from the microphone, including what is known as a" hot mic ". Record surrounding sounds without the user’s knowledge, as well as recording the audio of encrypted phone calls and taking pictures via the phone’s camera.

Researchers from Citizen Lab reported that they found 37 examples of the use of these "kismet" hacking software against journalists covering news about the Middle East. In reference to the hacking of the phones of dozens of Al-Jazeera journalists in an unprecedented cyber attack.

The researchers said, "Given the global reach of the NSO Group's customer base, and the apparent weakness of the iPhone's security almost before the iOS 14 update, we suspect that the infections we observed were a small fraction of the total attacks used."

In a statement, an Apple spokesperson said: “At Apple, our teams are working hard to enhance the security of user and device data. IOS 14 is a big leap forward in security and provides new protection against these types of attacks. The attack described in the paper is largely targeted by states against specific individuals. We always encourage customers to download the latest version of the operating system to protect themselves and their data. ”

Although the first alleged attacks using Kismet were last summer, the Citizen Lab claimed that records from hacked phones refer to the same technology, and that zero-day vulnerabilities have been exploited since October 2019.

Claims by Citizen Labs, which Apple said it could not definitively verify, point to the discovery of the most dangerous hacking attempts targeting iOS users since overcoming a similar widespread campaign in February 2019.

The campaign, which was discovered by Google's engineers and was revealed last August, used a vulnerability in Internet browsers to steal private data such as iMessages, photos and a real-time GPS location. In a public statement, Apple sought to downplay this attack by noting that it "affected fewer than ten websites focused on content related to the Uyghur community." The company made a similar point about Kismet, stating that NSO Group's clients are nation states, and its targets are a limited number of individuals.


Apple sought to make privacy and security major selling points for its devices. The company prides itself on not collecting user data for commercial purposes, and explains that it has been fighting and preventing any malware since the inception of the iPhone, and in 2014, Apple CEO Tim Cook attacked the Android system at a developer conference, describing it as a "toxic hell because of the many vulnerabilities." in it".

But in recent years, the gap between Apple and its competitors has closed. As more security researchers focus on mobile devices, very puzzling vulnerabilities have been discovered.

And earlier this month, another Google researcher named Ian Beer revealed A fierce iOS vulnerability It is a type of "zero-click, zero-day", which allowed him to fully control the iPhone as soon as he was in the range of the device's wifi. This bug was fixed by Apple in iOS 13.5.

NSO Group said its products are intended to tackle "organized crime and counterterrorism" and that any evidence of serious violation of its policies will be investigated. She added, "As we mentioned time and time again, we do not have access to any information regarding the identities of individuals who are being monitored through our system."

In your opinion, why focus on finding security breaches and vulnerabilities on the iPhone and the iOS system? Is Apple able to respond to international attacks? Let us know in the comments.

Source:

The Guardian

24 comment

comments user
Samer SM Asfour

Sorry, but as if the TV program that spoke about this issue attacked Yvonne Islam !!!!
For the first time, I find your article out of objectivity and without logic

    comments user
    Mahmoud Sharaf

    We only presented the news, and the details were dealt with by the media with professionalism and professionalism. There is no space here to mention these details.

comments user
Abdelhadi Ai

Since October 2012, Apple has become a partner in the US Military Intelligence Community's PRISM spy program, which gives the US Federal Police and the US military unrestricted access to this data without a warrant at any time they request it. In the first half of 2019 they did this more than 18000 times.

comments user
Abu Yousuf

Apple has not responded positively to the matter, as if our privacy ends when it comes to Israel.

comments user
Sherif

It is difficult for Apple to fight or close all security holes ... What it does is human action and is vulnerable to imperfection and gaps. There are also those who work day and night to find loopholes, such as governments, armies, and intelligence agencies.
For me it will still be the most reliable iOs knowing that Apple is working to fill the gaps. I also hope that Apple develops its capabilities to preemptively bridge the security holes.

3
1
comments user
Mardi Ahmed

May Allah reward you, iPhone Islam Team 🟩🟩🟩🟩🟩 On the authority of Abu Hurairah - may God be pleased with him - who said: The Messenger of God - may God bless him and grant him peace - said: ((Two words are light on the tongue, heavy on the scale, and beloved to the Most Merciful: Glory be to God and His praise, glory be to God the Almighty)); Agreed upon.

    comments user
    Mahmoud honor

    God reward you. Hallelujah and praise, Hallelujah great.

comments user
Ahmed Eldrshawy

There is no absolute safety, but Apple is on the same footing that it can transform the gaps

comments user
ƦƛƓЄӇ ƧƤƖƊЄƦ

Israel knows to penetrate 😂
Backward Jews

comments user
AliAlharbi

In front of Pegasus privacy in the wind. You are hacked as soon as you receive a message or call, even if you do not reply to it. This justifies the terrible amount of calls we are receiving from the Maldives, Lesotho and other countries.

    comments user
    Mahmoud honor

    Are right. We have to be as careful as possible, with the difficulty of it.

comments user
El hosney anwr

And what is the position of devices that were before the iOS 13 update

comments user
IzzalDin

The article is a shorthand for a greater hidden program that was broadcast yesterday

comments user
Eng. Gihad Eladl

And you quoted from the Zionist company its simply rude and vaunted response

    comments user
    Mahmoud honor

    This is their dogma and their malicious way. They always appear with two sly faces and harbor the wicked ones.

comments user
Eng. Gihad Eladl

Allegedly alleged
You used all verb conjunctions !!!

    comments user
    Mahmoud honor

    Ha-ha-ha-ha-ha, because the matter is all allegations

comments user
Saher Alsmadi

In your article, the word "claims" was repeated a lot, as if the news was not true!
The Israeli NSO Group is the strongest and most dangerous spy company in the world.
Pegasus is a dangerous spyware system that can be hacked into any phone, whether Apple or otherwise.
The system depends on security vulnerabilities, and there is no integrated system in the world, no matter how modernized it, the gaps will remain, and the evidence is that in the days of jailbreaking, Apple systems are always hacked.
These breakthroughs are sold to governments and states only for millions of dollars and with the approval of the Israeli Ministry of Defense.
The good thing is that the targeting is for certain people, whether politically active or news channels.
Conclusion: Once you buy a mobile device and connect it to the Internet, your information and data are cleared.
It is not possible for Apple or others to prevent or stop this Zionist company, especially since the Israeli courts have rejected several lawsuits against that company related to the violation of privacy.

10
    comments user
    SAEED ALGDANI

    Something terrifying, but the complaint to God

comments user
Ali MOHAMMED

How do we preserve our information ?!

comments user
The feast of the children

What we saw on the program “What is Hidden” is the greatest thing that is very scary

comments user
tammm ali

And it is not sold except after the approval of the Israeli Ministry of Defense

comments user
tammm ali

Did you know that the price of this Pagus spy software ranges from one million to XNUMX million dollars?

comments user
Abu Meshal

That company will fall when it cannot maintain trust from users

Leave a response

We are not responsible for any misuse of the information mentioned above. IPhone Islam is neither affiliated nor represented by Apple. IPhone, Apple and any other product name, service names or logos referenced herein are trademarks or registered trademarks of Apple Computer.

العربية简体中文NederlandsEnglishFilipinoFrançaisDeutschΕλληνικάहिन्दीBahasa IndonesiaItaliano日本語한국어كوردی‎فارسیPolskiPortuguêsРусскийEspañolTürkçeУкраїнськаاردوTiếng Việt