Loading stock data...

Apple Fixes Zero-Day Bugs Used to Plant Pegasus Spyware on Devices

nso group hq logo

Apple Releases Security Updates to Patch Zero-Day Exploits

On Thursday, Apple released security updates that patch two zero-day exploits used against a member of a civil society organization in Washington, D.C. The vulnerabilities were discovered by Citizen Lab, an internet watchdog group that investigates government malware.

Citizen Lab Finds Zero-Click Vulnerability

According to Citizen Lab’s short blog post, they found a zero-click vulnerability last week that was used to target victims with malware. The researchers stated that the vulnerability was part of an exploit chain designed to deliver NSO Group’s malware, known as Pegasus. "The exploit chain was capable of compromising iPhones running the latest version of iOS (16.6) without any interaction from the victim," Citizen Lab wrote.

Researchers Report Vulnerability to Apple

Once they found the vulnerability, the researchers reported it to Apple, which released a patch on Thursday, thanking Citizen Lab for reporting them. It appears that Apple may have found the second vulnerability while investigating the first, as the company patched another vulnerability and attributed its finding to itself.

Citizen Lab Calls Exploit Chain BLASTPASS

The researchers at Citizen Lab called the exploit chain "BLASTPASS" because it involved PassKit, a framework that allows developers to include Apple Pay in their apps. They warned that this exploit chain was capable of compromising iPhones without any interaction from the victim.

Lockdown Mode May Have Blocked Exploits

John Scott-Railton, a senior researcher at Citizen Lab, noted on Twitter that Lockdown Mode, an opt-in mode that enhances some security features and blocks others to reduce the risk of targeted attacks, would have blocked the exploits found in this case. He also stated that he and his colleagues, as well as Apple’s Security Engineering and Architecture team, believe that Lockdown Mode would have prevented these vulnerabilities.

Update: Citizen Lab Recommends Updating iPhones

Citizen Lab recommended that all iPhone users update their phones to prevent these vulnerabilities from being exploited. They emphasized the importance of staying up-to-date with security patches to protect against emerging threats.

NSO Group’s Pegasus Malware

The researchers at Citizen Lab specifically mentioned NSO Group’s malware, known as Pegasus, in relation to the exploit chain BLASTPASS. NSO Group has been linked to several high-profile hacking incidents and has faced scrutiny for its alleged involvement in human rights abuses through its spyware.

Apple’s Response

When reached for comment, Apple spokesperson Scott Radcliffe did not provide any additional information but referred TechCrunch to the notes in the security update.

Citizen Lab’s Role as Cybersecurity Early Warning System

John Scott-Railton tweeted that civil society organizations like Citizen Lab are serving as the cybersecurity early warning system for billions of devices around the world. He emphasized the importance of these organizations in identifying and reporting emerging threats to technology companies like Apple.

Update: Lockdown Mode and BLASTPASS Exploit Chain

On Friday, September 8th, this story was updated to include additional information about Lockdown Mode’s potential effectiveness against the BLASTPASS exploit chain.

Zero-Day Exploits: A Growing Concern

The discovery of zero-day exploits used by hackers to target iPhone users highlights a growing concern in the cybersecurity community. Zero-day exploits are vulnerabilities that are unknown at the time they are discovered, making them particularly challenging to defend against.

The Role of Citizen Lab and Other Civil Society Organizations

Citizen Lab’s role in discovering and reporting these vulnerabilities underscores the importance of civil society organizations in identifying emerging threats. These groups often serve as a critical first line of defense in detecting and mitigating cyber attacks.

Lockdown Mode: An Opt-In Security Feature

Apple introduced Lockdown Mode as an opt-in feature that enhances some security features and blocks others to reduce the risk of targeted attacks. The feature was designed to provide additional protection for users who are particularly concerned about being targeted by hackers.

The BLASTPASS Exploit Chain: A Detailed Analysis

Citizen Lab’s detailed analysis of the BLASTPASS exploit chain reveals a sophisticated attack vector that takes advantage of vulnerabilities in PassKit, a framework used for Apple Pay. The researchers noted that this exploit chain was capable of compromising iPhones without any interaction from the victim.

NSO Group and Pegasus Malware: A History of Controversy

NSO Group has faced intense scrutiny over its alleged involvement in human rights abuses through its spyware, including the use of Pegasus malware. The company’s products have been linked to several high-profile hacking incidents around the world.

Citizen Lab’s Recommendation for iPhone Users

In light of these discoveries, Citizen Lab recommends that all iPhone users update their devices to prevent these vulnerabilities from being exploited. They emphasize the importance of staying up-to-date with security patches to protect against emerging threats.

Conclusion

The discovery of zero-day exploits used by hackers to target iPhone users underscores the importance of ongoing cybersecurity efforts. Apple’s release of security updates and Citizen Lab’s detailed analysis of the BLASTPASS exploit chain highlight the need for vigilance in protecting against emerging threats. As technology continues to evolve, so too must our defenses against cyber attacks.

Additional Resources

Related Topics