Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.

MacRumors

macrumors bot
Original poster
Apr 12, 2001
63,560
30,891


Today's iOS 14.8 update addresses a critical vulnerability that Apple engineers have been working around the clock to fix, reports The New York Times.

nso-israeli-surveillance-firm.jpg

Last week, The Citizen Lab informed Apple about a new zero-click iMessage exploit targeting Apple's image rendering library. Called FORCEDENTRY, the exploit could infect an iPhone, iPad, Apple Watch, or Mac with the Pegasus spyware, providing access to the camera and microphone in addition to allowing access to text messages, phone calls, and emails.

FORCEDENTRY was distributed by Israel's NSO Group to governments and various other entities, and The Citizen Lab discovered it after analyzing the iPhone of a Saudi activist. Details were sent to Apple on September 7, and Apple took a week to fix the bug. According to The Citizen Lab, FORCEDENTRY has been in use since at least February 2021.

"This spyware can do everything an iPhone user can do on their device and more," said Citizen Lab senior researcher John-Scott Railton.

Apple lists the fix as CVE-2021-30860, and described it as a maliciously crafted PDF that could lead to arbitrary code execution.

Back in July, a slew of media reports highlighted zero-click iMessage exploits called Pegasus, which were distributed by Israeli surveillance firm NSO Group and were used to target journalists, lawyers, and human rights activists around the world. A database of more than 50,000 people who had been targeted by NSO's clients was made public at the time.

The Pegasus spyware is notable because it skirts BlastDoor, specific iMessage protections that Apple put into place in with the launch of iOS 14. BlastDoor is a sandbox security system for Messages that's designed to prevent exploits like Pegasus, but it's still a work in progress.

Apple told The New York Times that it plans to add spyware barriers to the iOS 15 software update to prevent similar attacks in the future.

Article Link: Apple's iOS 14.8 Update Fixes Zero-Click Exploit Used to Distribute Pegasus Spyware
 

PinkyMacGodess

Suspended
Mar 7, 2007
10,271
6,226
Midwest America.
Why did apple not start on this back in July?

What I got was it was REPORTED ON, the NGO company and Pegasus, and that this latest 'thing' was identified much more recently.

EDIT: There is an article from the Washington Post that gave me the clear idea that this new 'thing' was recently revealed and Apple acted on it pretty quickly. Maybe I misread the article, but I thought it was pretty much Apple giving NGO Group the finger, and fixing the flaw they exploited.
 
Last edited:
  • Like
Reactions: Localcelebrity

Realityck

macrumors G4
Nov 9, 2015
10,136
15,189
Silicon Valley, CA
From the NYTimes article
Apple’s security team has been working around the clock to develop a fix since Tuesday, after researchers at Citizen Lab, a cybersecurity watchdog organization at the University of Toronto, discovered that a Saudi activist’s iPhone had been infected with spyware from NSO Group.
Good that Apple acted against that Zero-Click Exploit so quickly. Don't even hesitate, update today.
 
Last edited:

Populus

macrumors 601
Aug 24, 2012
4,660
6,855
Spain, Europe
So... they actually announce the Pegassus fixes publicly... then what was iOS 14.7.1? Some media said it contained a fix for a vulnerability but Apple never said anything about the patch. Same for macOS 11.5.2, no word about the patch.

Strange...
 

thadoggfather

macrumors P6
Oct 1, 2007
15,551
16,287
So... they actually announce the Pegassus fixes publicly... then what was iOS 14.7.1? Some media said it contained a fix for a vulnerability but Apple never said anything about the patch. Same for macOS 11.5.2, no word about the patch.

Strange...

It was all pegasus fix foreplay for the warm and tingly feeling

to get you all jazzed up for the crescendo just before 15.0 GM drops internally tomorrow
 

Realityck

macrumors G4
Nov 9, 2015
10,136
15,189
Silicon Valley, CA
Did they? This has been a thing for years and a publicly known thing for a few months

damage already done
Looking at a older article "Dozens of journalists’ iPhones hacked with NSO ‘zero-click’ spyware", says Citizen Lab - Dec 20, 2020. Its likely they saw the evidence but not determined the process of how it occurred.
Citizen Lab, the internet watchdog at the University of Toronto, was asked to investigate earlier this year after one of the victims, Al Jazeera investigative journalist Tamer Almisshal, suspected that his phone may have been hacked.
Per Tech Crunch
In its latest findings, Citizen Lab said it found evidence of the ForcedEntry exploit on the iPhone of a Saudi activist, running at the time the latest version of iOS. The researchers said the exploit takes advantage of a weakness in how Apple devices render images on the display.

Citizen Lab now says that the same ForcedEntry exploit works on all Apple devices running, until today, the latest software.

Citizen Lab said it reported its findings to Apple on September 7.
 
Last edited:
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.