Last week, The Citizen Lab informed Apple about a new zero-click iMessage exploit targeting Apple’s image rendering library. Called FORCEDENTRY, the exploit could infect an iPhone, iPad, Apple Watch, or Mac with the Pegasus spyware, providing access to the camera and microphone in addition to allowing access to text messages, phone calls, and emails.
FORCEDENTRY was distributed by Israel’s NSO Group to governments and various other entities, and The Citizen Lab discovered it after analyzing the iPhone of a Saudi activist. Details were sent to Apple on September 7, and Apple took a week to fix the bug. According to The Citizen Lab, FORCEDENTRY has been in use since at least February 2021.
“This spyware can do everything an iPhone user can do on their device and more,” said Citizen Lab senior researcher John-Scott Railton.
Apple lists the fix as CVE-2021-30860, and described it as a maliciously crafted PDF that could lead to arbitrary code execution.
Back in July, a slew of media reports highlighted zero-click iMessage exploits called Pegasus, which were distributed by Israeli surveillance firm NSO Group and were used to target journalists, lawyers, and human rights activists around the world. A database of more than 50,000 people who had been targeted by NSO’s clients was made public at the time.
The Pegasus spyware is notable because it skirts BlastDoor, specific iMessage protections that Apple put into place in with the launch of iOS 14. BlastDoor is a sandbox security system for Messages that’s designed to prevent exploits like Pegasus, but it’s still a work in progress.
Apple told The New York Times that it plans to add spyware barriers to the iOS 15 software update to prevent similar attacks in the future.
This article, “Apple’s iOS 14.8 Update Fixes Zero-Click Exploit Used to Distribute Pegasus Spyware” first appeared on MacRumors.com
Discuss this article in our forums