Pegasus (spyware)

Pegasus is a spy software installable on iOS devices that allows the reading of messages, emails, passwords and address lists as well as eavesdropping on phone calls, making and transmitting audio recordings, and tracking the location on a compromised device.[1] The list of surveilled programs includes Gmail, Facebook, Skype, WhatsApp, FaceTime, Apple Calendar, WeChat,[1] Viber,[2] iMessage and Telegram.[3] iOS update 9.3.5, released 25 August 2016, removes the vulnerabilities,[4] and details of the exploit were made available at that time. Pegasus is the first remote jailbreak used in a targeted attack that has been discovered.[5]

iOS versions as early as iOS 7 are affected,[6][7] up to and including version 9.3.4.[4] At the time of discovery, this included 97% of iOS devices,[8] and virtually all[9] of the 1 billion[10] iPhones sold.

IT security firm Lookout and University of Toronto–based Citizen Lab jointly uncovered the three vulnerabilities involved in the hack—a privilege escalation, a memory management bug that can cause kernel memory to be exposed, and a WebKit bug allowing code execution from knowingly crafted websites.[11] Additionally, the malware uses strong encryption to evade discovery.[12]

The software is alleged to originate with Israeli company NSO Group[2] and to have been used against human rights campaigners and journalists,[4] possibly at the behest of the United Arab Emirates government.[13] The discovery came after human rights lawyer Ahmed Mansoor submitted a link for analysis that he considered suspicious.[2] Apple Inc. fixed the vulnerability within ten days of its discovery.[4]

Subsequent media discussion focused on the implications for user trust in smartphones[14] as well as details about the company alleged to have carried out the hack.[15]

See also

References

  1. 1 2 "Mächtige Spionage-Software für iPhones entdeckt". Der Standard. August 26, 2016. (German)
  2. 1 2 3 "Apple tackles iPhone one-tap spyware flaws - BBC News". Bbc.com. August 6, 2015. Retrieved August 26, 2016.
  3. Thomas Fox-Brewster (August 25, 2016). "Everything We Know About NSO Group: The Professional Spies Who Hacked iPhones With A Single Text". Forbes.com. Forbes.com. Retrieved August 27, 2016.
  4. 1 2 3 4 Ben Schwan (February 11, 2016). "iOS-Update: iOS 9.3.5 geht gegen Spionagesoftware "Pegasus" vor". heise online. Retrieved August 26, 2016.
  5. The Million Dollar Dissident: NSO Group’s iPhone Zero-Days used against a UAE Human Rights Defender (Technical report). Citizen Lab. August 25, 2015. Retrieved August 25, 2016.
  6. Andreas Albert and Markus Böhm (2016-08-26). "Apple iPhone: Was Sie über "Pegasus" wissen sollten - SPIEGEL ONLINE". Spiegel.de. Retrieved 2016-09-13.
  7. SektionEins GmbH - Stefan Esser. "PEGASUS iOS Kernel Vulnerability Explained - Part 2 | SektionEins GmbH". Sektioneins.de. Retrieved 2016-09-13.
  8. "App Store - Support - Apple Developer". Developer.apple.com. August 15, 2016. Retrieved August 26, 2016.
  9. David Smith. "iOS Version Stats". David Smith. Retrieved August 26, 2016.
  10. "Apple celebrates one billion iPhones". Apple. July 27, 2016. Retrieved August 26, 2016.
  11. Lookout and Citizen Lab (August 25, 2016). "Sophisticated, persistent mobile attack against high-value targets on iOS". Lookout. Retrieved October 9, 2016.
  12. Clover, Juli (August 25, 2016). "Apple Releases iOS 9.3.5 With Fix for Three Critical Vulnerabilities Exploited by Hacking Group". MacRumors. Retrieved August 26, 2016.
  13. "Apple issues global iOS update after attempt to use spyware on activist's iPhone". The Guardian. August 25, 2016.
  14. "Beispielloser iPhone-Hack läutet neue Ära der Unsicherheit ein". Neue Presse. August 26, 2016. (German)
  15. "Who are the hackers who cracked the iPhone?". BBC News. August 26, 2016.
This article is issued from Wikipedia - version of the 11/16/2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.