QuaDream, an Israeli firm, altered an iPhone bug for spyware

QuaDream, an Israeli firm, altered an iPhone bug for spyware


Short News:- 

A now-patched security vulnerability in Apple iOS was also weaponized by a different surveillance vendor. The zero-click exploit in question is FORCEDENTRY, a flaw in Apple's iMessage service. Apple corrected the underlying defect in September 2021 and later filed a lawsuit against the NSO Group. The FBI confirmed to The Washington Post that it had obtained a license to use spyware from the NSO Group. The agency only used the product "for product testing and evaluation," and it never used it in an operational capacity. The group has been linked to numerous instances of political surveillance targeting diplomats and government officials.


QuaDream, an Israeli firm, altered an iPhone bug for spyware


Detailed News:- 

One of Apple's now-patched security vulnerabilities, which had previously been discovered to be exploited by the Israeli company NSO Group, was also weaponized by a different surveillance vendor named QuaDream to hack into the company's devices, according to the company.

Reports from unnamed sources indicated that "the two rival businesses gained the same ability last year to remotely break into iPhones [and] compromise Apple phones without an owner having to open a malicious link." Reuters reported that "the two rival businesses gained the same ability to remotely break into iPhones and compromise Apple phones without an owner having to open a malicious link."

In this case, the zero-click exploit in question is FORCEDENTRY, which is a flaw in Apple's iMessage that could be exploited to circumvent iOS security measures and install spyware on a victim's phone, giving attackers access to a trove of information including contacts, email attachments, files, messages, and photos, as well as the phone's camera and microphone.

Known as REIGN, QuaDream's spyware is similar to NSO Group's Pegasus in that it allows its users to have complete control over the infected device. On September 20, 2021, Apple corrected the underlying defect and later sued NSO Group for abusing the vulnerability to infect iPhones with surveillance ware.

A shocking report published late last month by The New York Times detailed the Central Intelligence Agency's (CIA) use of Pegasus to combat terrorism in Djibouti as well as the purchase of the aircraft by a number of countries, including India, Mexico, Saudi Arabia, and the United Arab Emirates (U.A.E.).

It was also revealed during the year-long investigation that the FBI in the United States "purchased and tested NSO software for years with the intention of using it for domestic surveillance until the agency ultimately decided last year not to deploy the tools."

Atop that, the new system, dubbed Phantom, is believed to have been equipped with the ability to target phone numbers in the United States, which is in direct opposition to the company's previous claims that its spyware cannot be used on phone numbers that have the +1 international dialing code.

The FBI confirmed to The Washington Post earlier this week that it had, in fact, obtained a license to use the tool and test its capabilities on phones that were equipped with foreign SIM cards. But the agency went on to say that it only used the product "for product testing and evaluation," and that it never used it in an operational capacity or to assist with an investigation of any nature.

As a result of the company's spyware being linked to a slew of instances of political surveillance targeting diplomats and government officials in countries such as Finland, Poland, and the United States, NSO Group was also placed on the United States government's blacklist in November 2021.

According to Richard Melick, director of a product strategy at Zimperium, "the continuous revelations surrounding advanced spyware programs over the course of the last year demonstrate to the world just how much development is behind sophisticated mobile attacks." 'These attacks are more than just a single vulnerability or exploit; they are a collection of fully developed toolsets that are designed to deliver the most effective spyware to its customers, who come from both known and unknown organizations,' says the author.

Melick continued, "Despite the absence of advanced threat detection solutions, the mobile phone's continuous connections with personal and critical data systems make it a lucrative target for any malicious organization and its customers."

0 Comments

Your suggestions and comments are welcome

Post a Comment

Your suggestions and comments are welcome

Post a Comment (0)

Previous Post Next Post