Yesterday, Apple filed a lawsuit against the Zionist NSO Group to hold it accountable for monitoring and targeting the company’s users. Apple provided new information about how the NSO Group accessed victims’ devices through its malicious programs, and all this in an attempt to ban the Zionist company from using any programs, services or devices belonging to Apple and prevent it of abuse and harm to more users.


Pegasus program

The NSO Group creates advanced surveillance technology sponsored by the Zionist entity and through its highly targeted spyware it can monitor its victims and the company's attacks target a very small number of users and they affect people across multiple platforms including iPhone and Android and mostly these programs are used The company is used by governments and organizations to target journalists, activists, dissidents, academics and sometimes government officials.

“That has to change as Apple devices are the most secure consumer devices on the market but private companies developing state-sponsored spyware are becoming more and more dangerous,” said Craig Federighi, Apple's senior vice president of software engineering. While these cybersecurity threats affect only a very small number of our customers, we take any attack on our users very seriously and are constantly working to enhance the security and privacy protections in iOS to keep all of our users safe.”


New information

In the lawsuit, Apple provided new information about FORCEDENTRY developed by NSO Group, which is a now-corrected security vulnerability that was previously used to hack a victim's Apple device and install the latest version of the Pegasus software. The vulnerability was originally identified by the research group at the University of Toronto. Citizen Lab.

To exploit the FORCEDENTRY vulnerability on Apple devices, the attackers created Apple IDs to send malicious data to the victim's device, allowing the NSO Group or its clients to download and install the Pegasus spyware without the victim's knowledge. Apple servers.

Apple said it fixed a flaw that enabled NSO Group's software to access private data on iPhones through "zero-click or zero-press" attacks where the malware is delivered through a text message and is undetected, after which Pegasus users can Remotely monitor the activities of the iPhone owner, including access to the microphone and camera, and the collection of emails, text messages, and browsing history.

The US Department of Commerce blacklisted the NSO group earlier this month and banned it from using US technology in its operations. Facebook's WhatsApp is suing the NSO group separately, and of course the Zionist company's response was that it sells its technology to law enforcement and intelligence agencies to prevent crime and terrorist acts. Not to spy on others.

Finally, Apple manufactures the most secure mobile devices on the market and is constantly enhancing the privacy and security protection of its users, which is why a recent study showed that less than 2% of mobile malware targets the iPhone, and the latest operating system, iOS 15, includes a number of security protections. New including important upgrades to the BlastDoor security mechanism. While NSO Group spyware continues to evolve, Apple has not noticed any evidence of successful remote attacks against devices running iOS 15 and later.

Do you think what Apple is doing helps protect its users, tell us in the comments

Source:

apple

Related articles