Although more than 60 zero-day exploits have been disclosed so far in 2021, it's still a figure that Apple would prefer a lower share of. If you feel like you've read this headline before, you're not wrong.Ģ021 has been a difficult year for Apple security, with at least 16 zero-day exploits found across its products. Why Do Hackers Keep Exploit Apple Products? The exploit, known as ForcedEntry, is not only remarkable in that it is a no-click remote attack but that it also appears to have actively compromised the latest versions of iOS.Ĭitizen Lab found the Pegasus spyware and the ForcedEntry exploit running on iOS versions 14.4 and 14.6, completely avoiding Apple's BlastDoor sandboxing to infect the entire device. In short, those with a license to use Pegasus could infect Apple devices without alerting the user, tracking texts, calls, emails, camera, microphone, and more, without requiring any user interaction. The NSO Group's notorious Pegasus spyware features numerous advanced surveillance and intrusion techniques, but the deployment of a zero-click exploit pushes the bar to another level. Yet again, the incredible research team at Citizen Lab has uncovered an exploit used to hack high-profile Apple devices targeted by clients of the NSO Group. Israel's NSO Group is exploiting what's known as the Holy Grail of remote surveillance, a "zero-click remote exploit," allowing their Pegasus spyware to infect devices without any interaction.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |