Apple sues NSO Group for hacking into iPhones with 'Pegasus' Spyware

Apple sues NSO Group for hacking into iPhones with 'Pegasus' Spyware

Apple has sued Israel's NSO group, which it says is behind the controversial spyware called Pegasus. 

In a blog post on Tuesday [November 23, 2021], Apple announced the lawsuit against NSO in hopes of holding "it accountable for the surveillance and targeting of Apple users."

Advertisement

Apple has gone a step further. To prevent NSO from causing "further abuse," Apple is seeking a "permanent injunction" which would ban NSO from using any Apple software, device, or services.

NSO - A state-sponsored actor

“State-sponsored actors like the NSO Group spend millions of dollars on sophisticated surveillance technologies without effective accountability. That needs to change,” Apple’s senior vice president of Software Engineering, Craig Federighi, said in the blog post.

Federighi added that these threats only affect only a small number of their customers through NSO Group's "FORCEDENTRY" exploit, which exploited a now-patched vulnerability to break into an Apple user's phone to install Pegasus.

Initially, the exploit was discovered by Citizen Lab, a research group from the University of Toronto. A list of all targeted individuals in different countries was shared collectively by media houses around the globe earlier this year.

What can Pegasus do?

Pegasus can easily access the microphone, camera, and other data on Apple and Android devices. FORCEDENTRY was delivered to Apple devices by creating Apple IDs that sent dangerous data to a victim's iPhone. Owing to this, the spyware was installed without the victim's knowledge.

Apple also announced a $10 million contribution to support cybersurveillance researchers and advocates

The spyware has reportedly been used in countries across the globe including India to snoop on government officials, opposition leaders, activists, and journalists. Earlier, NSO had claimed that it only sells its Pegasus spyware to elected governments across the globe.

Below is the blog post by Apple on the law suit.

Apple sues NSO Group to curb the abuse of state-sponsored spyware

Apple on Tuesday filed a lawsuit against NSO Group and its parent company to hold it accountable for the surveillance and targeting of Apple users.

The complaint provides new information on how NSO Group infected victims’ devices with its Pegasus spyware. To prevent further abuse and harm to its users, Apple is also seeking a permanent injunction to ban NSO Group from using any Apple software, services, or devices.

NSO Group creates sophisticated, state-sponsored surveillance technology that allows its highly targeted spyware to surveil its victims.

These attacks are only aimed at a very small number of users, and they impact people across multiple platforms, including iOS and Android.
Researchers and journalists have publicly documented a history of this spyware being abused to target journalists, activists, dissidents, academics, and government officials.

“State-sponsored actors like the NSO Group spend millions of dollars on sophisticated surveillance technologies without effective accountability.

That needs to change,” said Craig Federighi, Apple’s senior vice president of Software Engineering. “Apple devices are the most secure consumer hardware on the market — but private companies developing state-sponsored spyware have become even more dangerous. While these cybersecurity threats only impact a very small number of our customers, we take any attack on our users very seriously, and we’re constantly working to strengthen the security and privacy protections in iOS to keep all our users safe.”

NSO Group’s FORCED ENTRY Exploit

Apple’s legal complaint provides new information on NSO Group’s FORCEDENTRY, an exploit for a now-patched vulnerability previously used to break into a victim’s Apple device and install the latest version of NSO Group’s spyware product, Pegasus. The exploit was originally identified by the Citizen Lab, a research group at the University of Toronto.

The spyware was used to attack a small number of Apple users worldwide with dangerous malware and spyware. Apple’s lawsuit seeks to ban NSO Group from further harming individuals by using Apple’s products and services. The lawsuit also seeks redress for NSO Group’s flagrant violations of US federal and state law, arising out of its efforts to target and attack Apple and its users.

NSO Group and its clients devote the immense resources and capabilities of nation-states to conduct highly targeted cyberattacks, allowing them to access the microphone, camera, and other sensitive data on Apple and Android devices.

To deliver FORCEDENTRY to Apple devices, attackers created Apple IDs to send malicious data to a victim’s device — allowing NSO Group or its clients to deliver and install Pegasus spyware without a victim’s knowledge. Though misused to deliver FORCEDENTRY, Apple servers were not hacked or compromised in the attacks.

Apple makes the most secure mobile devices on the market, and constantly invests in strengthening privacy and security protections for its users.

For example, researchers have found that other mobile platforms have 15 times more malware infections than iPhone,2 and a recent study showed that less than 2 percent of mobile malware targets iOS devices.

iOS 15 includes a number of new security protections, including significant upgrades to the Blast Door security mechanism. While NSO Group spyware continues to evolve, Apple has not observed any evidence of successful remote attacks against devices running iOS 15 and later versions. Apple urges all users to update their iPhone and always use the latest software.

“At Apple, we are always working to defend our users against even the most complex cyberattacks. The steps we’re taking today will send a clear message: In a free society, it is unacceptable to weaponize powerful state-sponsored spyware against those who seek to make the world a better place,” said Ivan Krstić, head of Apple Security Engineering and Architecture.

“Our threat intelligence and engineering teams work around the clock to analyze new threats, rapidly patch vulnerabilities, and develop industry-leading new protections in our software and silicon. Apple runs one of the most sophisticated security engineering operations in the world, and we will continue to work tirelessly to protect our users from abusive state-sponsored actors like NSO Group.”

Apple’s continuing efforts to protect its users

Apple commends groups like the Citizen Lab and Amnesty Tech for their groundbreaking work to identify cybersurveillance abuses and help protect victims. To further strengthen efforts like these, Apple will be contributing $10 million, as well as any damages from the lawsuit, to organizations pursuing cybersurveillance research and advocacy.

Apple will also support the accomplished researchers at the Citizen Lab with pro-bono technical, threat intelligence, and engineering assistance to aid their independent research mission, and where appropriate, will offer the same assistance to other organizations doing critical work in this space.

“Mercenary spyware firms like NSO Group have facilitated some of the world’s worst human rights abuses and acts of transnational repression, while enriching themselves and their investors,” said Ron Deibert, director of the Citizen Lab at the University of Toronto. “I applaud Apple for holding them accountable for their abuses, and hope in doing so Apple will help to bring justice to all who have been victimized by NSO Group’s reckless behavior.”

Apple is notifying the small number of users that it discovered may have been targeted by FORCEDENTRY. Any time Apple discovers activity consistent with a state-sponsored spyware attack, Apple will notify the affected users in accordance with industry best practices.

Apple believes privacy is a fundamental human right, and security is a constant focus for teams across the company. For years, Apple has led the industry with new protections to disrupt sophisticated attacks and defend its users, including features such as pointer authentication codes (PAC), BlastDoor, and the Page Protection Layer (PPL).

Connect With Us : 0242202447 | 0551484843 | 0266361755 | 059 199 7513 |

Like what you see?

Hit the buttons below to follow us, you won't regret it...

0
Shares