Article 5SND2 iPhones of US diplomats hacked using “0-click” exploits from embattled NSO

iPhones of US diplomats hacked using “0-click” exploits from embattled NSO

by
Dan Goodin
from Ars Technica - All content on (#5SND2)
espionage-surveillance-800x534.jpeg

Enlarge (credit: Getty Images)

The iPhones of nine US State Department officials were infected by powerful and stealthy malware developed by NSO Group, the Israeli exploit seller that has come under increasing scrutiny for selling its wares to customers who in turn use it to spy on journalists, lawyers, activists, and US allies.

The US officials, either stationed in Uganda or focusing on issues related to that country, received warnings like this one from Apple informing them their iPhones were being targeted by hackers. Citing unnamed people with knowledge of the attacks, Reuters said the hackers used software from NSO.

When you wake up to a threat notification from @Apple that your iPhone is being targeted then you know that cyber terrorism from state sponsored cyber terrorists is real. pic.twitter.com/1uZ9eIf1FR

- Norbert Mao (@norbertmao) November 24, 2021
No clicking required

As previously reported, NSO software known as Pegasus uses exploits sent through messaging apps that infect iPhones and Android devices without requiring targets to click links or take any other action. From there, the devices run hard-to-detect malware that can download photos, contacts, text messages, and other data. The malware also allows the operator to listen to audio and view video in real time.

Read 3 remaining paragraphs | Comments

index?i=iAUVcFkwwRI:O_TmMdRK58Q:V_sGLiPB index?i=iAUVcFkwwRI:O_TmMdRK58Q:F7zBnMyn index?d=qj6IDK7rITs index?d=yIl2AUoC8zA
External Content
Source RSS or Atom Feed
Feed Location http://feeds.arstechnica.com/arstechnica/index
Feed Title Ars Technica - All content
Feed Link https://arstechnica.com/
Reply 0 comments