Skip to content
August 17, 2022
  • Facebook
  • Twitter
  • YouTube
  • Instagram
  • Reddit
  • Telegram
  • TikTok
  • LinkedIn
Orinoco Tribune – News and opinion pieces about Venezuela and beyond

Orinoco Tribune – News and opinion pieces about Venezuela and beyond

From Venezuela and made by Venezuelan Chavistas

Primary Menu
  • News
  • Opinion
  • About us
    • About us
    • Who we are – Becoming a Volunteer
    • Editorial guidelines for contributors
    • Our Sources
      • Venezuelan Sources
      • International Sources
    • Contact us
  • Categories
    • Politics
    • Economy
    • Security and Defense
    • International
      • Africa
      • Asia
      • Europe
      • Oceania
      • US/Canada
    • Latin America and ALBA-TCP
      • South America
      • Central America and the Caribbean (+Mexico)
    • Ideology-Commune-Labor
    • Health-Education-Sport-Culture-Technology
    • Solidarity and Social Movements
    • OT Specials
  • Support Us
Light/Dark Button
YouTube Channel
  • Home
  • News
  • The Pegasus Saga: All iPhone Devices Were Exploited by Israeli Spy Tech Firm, Report Indicates
  • International
  • News

The Pegasus Saga: All iPhone Devices Were Exploited by Israeli Spy Tech Firm, Report Indicates

scorinoco September 16, 2021

The digital rights group CitizenLab has discovered a vulnerability that allowed Israeli spyware company NSO Group to implant its Pegasus malware onto virtually every iPhone, Mac, and Apple Watch device.

CitizenLab revealed the vulnerability on Monday, a week after discovering it by analyzing the phone of a Saudi activist that had been infected with the malware. The discovery was announced to the public shortly after Apple rolled out an update to patch the vulnerability.

NEW REPORT

FORCEDENTRY: NSO Group iMessage Zero-Click Exploit captured in the Wildhttps://t.co/IrtsNRVPGS

— Citizen Lab (@citizenlab) September 13, 2021

The vulnerability allowed the NSO Group’s clients to send malicious files disguised as .gif files to a target’s phone, which would then exploit “an integer overflow vulnerability in Apple’s image rendering library” and leave the phone open to the installation of NSO Group’s now-infamous Pegasus malware.

RELATED CONTENT: Pegasus is Just the Tip of the Israeli Cyber Spying Iceberg, with Whitney Webb

The exploit is what’s known as a “zero-click” vulnerability, meaning that the target user would not have to click a suspicious link or file to allow the malware onto their device.

While most Apple devices were vulnerable, according to the researchers, not all of those afflicted by the spyware were breached in this way. Instead, NSO Group sold the use of its malware to clients around the world, who used the tool to spy on the phones of rival politicians, journalists, activists, and business leaders.

BIG NEWS: Do you own an Apple product? UPDATE IT NOW. New zero-click NSO Group #Pegasus spyware has been infecting iPhones, Macs, Watches. This is the Holy Grail of surveillance capabilities and you are vulnerable until you update. https://t.co/GktK822Zo2

— Nicole Perlr🌻th (@nicoleperlroth) September 13, 2021

News of the malware’s existence was first broken earlier this summer by Amnesty International and Forbidden Stories, a French investigative outlet, and reported by a collection of partner news outlets. Among those accused of using the Israeli malware are current or former governments of Azerbaijan, Bahrain, Hungary, India, Kazakhstan, Mexico, Morocco, Rwanda, Saudi Arabia, and the United Arab Emirates (UAE).

RELATED CONTENT: Mexico Discloses Contracts Linked to Israeli Company NSO Group Signed by Previous Governments (Pegasus)

.@RahulGandhi had rightly said that #Pegasus snooping is an issue of TREASON. The Govt cannot cite 'national security' and run away from questions, scrutiny. pic.twitter.com/qtm7a46Zhw

— Ruchira Chaturvedi (@RuchiraC) September 13, 2021

A leaked list suggested that as many as 52,000 names were marked as possible targets for surveillance by NSO Group’s customers, and roughly a tenth of these targets were reportedly surveilled. Pegasus granted users access to calls, messages, photos and files, and allowed them to secretly turn on the target phones’ cameras and microphones.

CitizenLab pinned the latest exploit on NSO Group after discovering a so-called “digital artifact” left behind that matched calling cards left by the company’s other exploits, and similarly-named processes in its code.

The NSO Group has not commented on CitizenLab’s latest research, which comes just one day before Apple’s anticipated unveiling of the iPhone 13 ahead of its launch later this month.

 

Featured image: Israeli malware Pegasus has been used to spy on journalists, activists, politicians in different countries. Photo from Wikimedia Commons

(The Palestine Chronicle)

Want More?

Don't want to be a victim of the Algorithm?

SIGN UP TO RECEIVE OUR WEEKLY NEWSLETTER WITH ALL YOU NEED TO KNOW ABOUT VENEZUELA

We don’t spam! Read our privacy policy for more info.

scorinoco
+ posts
  • scorinoco
    https://orinocotribune.com/author/sahelicot92/
    US Senators Introduce Bill to Continue Theft of Venezuelan Resources
  • scorinoco
    https://orinocotribune.com/author/sahelicot92/
    Thousands of Refugee Deaths Linked to EU's Illegal Expulsion: Report
  • scorinoco
    https://orinocotribune.com/author/sahelicot92/
    NicaNotes: Nicaragua and Central American Migration
  • scorinoco
    https://orinocotribune.com/author/sahelicot92/
    Eleven Suspects in Moïse's Murder Arrested at Taiwanese Embassy in Haiti
Tags: Apple Citizen Lab digital surveillance Forbidden Stories Israeli spyware NSO Group Pegasus spyware spying

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Telegram (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Continue Reading

Previous Previous post:

Coups, Censorship & Propaganda: the US New Cold War Playbook

Troops during this month’s coup in Guinea, which destroyed the country’s hopes of seeing the benefits from China’s Belt and Road Initiative.
Next Next post:

How US Media Misrepresent the Wuhan Institute of Virology’s Laboratories and Safety Protocols

Tax deductible donations

One time donations

Recurrent donations

Calendar

August 2022
M T W T F S S
1234567
891011121314
15161718192021
22232425262728
293031  
« Jul    

NEWS: Most Viewed 72 Hours

Categories

Subscribe to Our Weekly Newsletter

We keep your data private and share your data only with third parties that make this service possible. Read our Privacy Policy.

Check your inbox or spam folder to confirm your subscription.

OPINION: Most Viewed 72 hours

We are on Telegram


Receive our news directly in your cellphone or PC, join us on our TELEGRAM channel: https://t.me/OrinocoTribune1

Download TELEGRAM, click the link above and then press the JOIN button.

We are Copyleft not Copyright


Creative Commons License
All Orinoco Tribune's work is free to use and licensed under a Creative Commons Attribution 4.0 International License.

We are on Reddit


If you are more into REDDIT, join our Orinoco Tribune Community.
Just click below and then click JOIN
https://www.reddit.com/r/OrinocoTribune/

 

  • Facebook
  • Twitter
  • YouTube
  • Instagram
  • Reddit
  • Telegram
  • TikTok
  • LinkedIn
Copyleft, No rights reserved.