Explorer

Apple Releases Software Update To Fix Pegasus-Linked Flow Targeting iPhone, iPad & Other Devices

A team of researchers at Toronto-based Citizen Lab, who have been investigating Pegasus Spyware, found the problem while analysing a Saudi activist's phone that had been compromised with the code.

New Delhi: Days after heated controversy around globe over Pegasus spyware allegedly tapping phones of human rights activists, journalists and even heads of state, Apple has detected a new zero-day, zero-click exploit called ‘FORCEDENTRY’ in Apple’s iMessage service, allegedly used by Israel’s NSO Group to install Pegasus spyware in devices including the iPhone, iPad, MacBook and Apple Watch.

A team of researchers at Toronto-based Citizen Lab, who have been investigating Pegasus Spyware, found the problem while analysing a Saudi activist's phone that had been compromised with the code.

ALSO READ | Pegasus Project: Over 40 Journalists, 2 Ministers, 1 Judge, And 3 Oppn Leaders Were Alleged Targets

According to media reports, the cybersecurity watchdog organisation in Canada, released a software update for a weakness that can let the spyware infect devices without users even clicking on a malicious message or link. The researchers have advised to update the operating systems on their Apple devices in order to avoid their smartphones and laptops getting affected till the update rolled out by Apple on Monday is installed.

"We determined that the mercenary spyware company NSO Group used the vulnerability to remotely exploit and infect the latest Apple devices with the Pegasus spyware," Citizen Lab wrote in a post.

Hours after releasing the fix, Apple said it had "rapidly" developed the update following Citizen Lab's discovery of the problem.

"Attacks like the ones described are highly sophisticated, cost millions of dollars to develop, often have a short shelf life, and are used to target specific individuals," the company said.

ALSO READ | Is Your Phone And WhatsApp Safe Against Pegasus? Know How To Avoid This Spyware

Citizen Lab researcher John Scott-Railton  in a series of tweets explained how the Citizen Lab discovered the exploit.

"We believe that the FORCEDENTRY exploit has been in use by NSO Group since at least February 2021. According to Apple’s analysis, the exploit works against all iOS, MacOS, and WatchOS versions prior to those released September 13, 2021 (today)," Marczak said. 

Israeli firm NSO Group has been under fire  across globe since an international media investigation claimed it was used to spy on the phones of human rights activists, journalists and even heads of state.

(With inputs from AFP)

Top Headlines

ISRO PSLV-C62 Mission Faces Anomaly During Stage 3 Of Launch, ISRO Analysing Data
ISRO PSLV-C62 Mission Faces Anomaly During Stage 3 Of Launch, ISRO Analysing Data
Were Indians Arrested During Iran Protests? Iranian Envoy Clarifies
Were Indians Arrested During Iran Protests? Iranian Envoy Clarifies
Multiple Suspected Drone Intrusions Reported Near LoC, IB In J&K
Multiple Suspected Drone Intrusions Reported Near LoC, IB In J&K
'Hindutva Is Hinduism In Paranoia': Mani Shankar Aiyar's Comments Spark Row
'Hindutva Is Hinduism In Paranoia': Mani Shankar Aiyar's Comments Spark Row

Videos

National News: PM Modi addresses Somnath Swabhiman Parv, recalls 1,000-year legacy of faith and resilience
Breaking News: Bihar MLA and Singer Maithili Thakur Campaigns in Mumbai, Promises BMC Mayoral Win for Mahayuti
Special Coverage: PM Modi Reflects on Somnath Temple’s 1000-Year Legacy, Tribute to Sardar Patel and India’s Resilience
Uttarakhand News: Ankita Bhandari case: Bandh largely ineffective as traders step back, security tightened
Breaking News: PM Modi Receives Grand Welcome at Somnath Swabhiman Parv, Pays Tribute to India’s Forgotten Heroes

Photo Gallery

25°C
New Delhi
Rain: 100mm
Humidity: 97%
Wind: WNW 47km/h
See Today's Weather
powered by
Accu Weather
Embed widget