![]() The FORCEDENTRY exploit was supposedly developed to bypass Apple's security updates that were patched in the BlastDoor security system.Ĭitizen Lab sent its discoveries to Apple on September 7th, and the Cupertino company after analyzing the samples, confirmed that the files contained a zero-day exploit that impacted iOS and macOS devices.Īpple has assigned CVE-2021-30860 for the security issue. The security group says the mitigation may have been actively used since February 2021. The security exploit targets Apple’s image rendering library, called CoreGraphics, causing an integer overflow. These weren't just zero-day attacks, but also zero-click exploits, meaning they needed no intervention from the user to infect the device. This was how the FORCEDENTRY exploit chain infected the device with the Pegasus surveillance tech. The malicious files contained some arbitrary code that caused crashes on the phone, allowing it to be hacked. What's interesting here is that these files weren't actually GIFs, some of them were Adobe PSD files and others were PDFs. GIF files were present in the phone's iMessage app, and these had been received just before the device had been compromised. ![]() The iPhone was believed to have been infected by Pegasus, a spyware that was developed by NSO Group.Ĭitizen Lab extracted a backup of the device from iTunes, and began analyzing its contents. Here's how the security threat was unearthed.Ĭanadian security research company, Citizen Lab, obtained a phone from an anonymous activist from Saudi Arabia in March 2021.
0 Comments
Leave a Reply. |