NSO Group iMessage Zero-Click Exploit Captured in the Wild
by Fugitifer - September 14, 2021 at 07:22 AM

    While analyzing the phone of a Saudi activist infected with NSO Group’s Pegasus spyware, we discovered a zero-day zero-click exploit against iMessage. The exploit, which we call FORCEDENTRY, targets Apple’s image rendering library, and was effective against Apple iOS, MacOS and WatchOS devices.

    We determined that the mercenary spyware company NSO Group used the vulnerability to remotely exploit and infect the latest Apple devices with the Pegasus spyware. We believe that FORCEDENTRY has been in use since at least February 2021.

    The Citizen Lab disclosed the vulnerability and code to Apple, which has assigned the FORCEDENTRY vulnerability CVE-2021-30860 and describes the vulnerability as “processing a maliciously crafted PDF may lead to arbitrary code execution.”

    Today, September 13th, Apple is releasing an update that patches CVE-2021-30860. We urge readers to immediately update all Apple devices.

Amazing read.. thanks for sharing this
Curious to know what kind of cost incurred by these governments to implement this.
(October 05, 2021 at 05:00 PM)LyraLuminara Wrote: Curious to know what kind of cost incurred by these governments to implement this.

IIRC governments spend a shit ton on zero days as they are losing the ability to develop them in house anymore so they have to outsource to developers and researchers.
Good time to be in the game as you can either submit bugs and vulnerabilities to the vendor or to brokers instead.

Possibly Related Threads…
Thread Author Replies Views Last Post
Group-IB CEO arrested for high treson in Moscow f1sh_oil 0 610 September 29, 2021 at 01:53 PM
Last Post: f1sh_oil
A group of "hackers on steroids" gained access to a large dataset belonging to Epik Lorenzo 5 1,523 September 24, 2021 at 03:35 PM
Last Post: DisOleThang
Zero-Day Chrome Bug In Wild jstone6154 3 1,116 July 26, 2021 at 01:38 AM
Last Post: cxaqhq

 Users browsing this thread: 1 Guest(s)