SALES, RENTALS & LAYAWAYS

PROTECTING EVERYTHING THAT HAS EVER BEEN OF VALUE TO YOU

Open 24/7/365

We Have A Life-Time Warranty /
Guarantee On All Products. (Includes Parts And Labor)

Apple Sues NSO Group To Curb The Abuse Of State-Sponsored Spyware

Apple also announced a $10 million contribution to support cybersurveillance researchers and advocates. Apple Sues NSO Group To Curb The Abuse Of State-Sponsored Spyware

Apple today filed a lawsuit against NSO Group and its parent company to hold it accountable for the surveillance and targeting of Apple users. The complaint provides new information on how NSO Group infected victims’ devices with its Pegasus spyware.

Related:

Apple Cyber Flaw Allows Silent iPhone Hack Through iMessage

To prevent further abuse and harm to its users, Apple is also seeking a permanent injunction to ban NSO Group from using any Apple software, services, or devices.

NSO Group creates sophisticated, state-sponsored surveillance technology that allows its highly targeted spyware to surveil its victims. These attacks are only aimed at a very small number of users, and they impact people across multiple platforms, including iOS and Android. Researchers and journalists have publicly documented a history of this spyware being abused to target journalists, activists, dissidents, academics, and government officials.

“State-sponsored actors like the NSO Group spend millions of dollars on sophisticated surveillance technologies without effective accountability. That needs to change,” said Craig Federighi, Apple’s senior vice president of Software Engineering. “Apple devices are the most secure consumer hardware on the market — but private companies developing state-sponsored spyware have become even more dangerous.

While these cybersecurity threats only impact a very small number of our customers, we take any attack on our users very seriously, and we’re constantly working to strengthen the security and privacy protections in iOS to keep all our users safe.”

NSO Group’s FORCEDENTRY Exploit

Apple’s legal complaint provides new information on NSO Group’s FORCEDENTRY, an exploit for a now-patched vulnerability previously used to break into a victim’s Apple device and install the latest version of NSO Group’s spyware product, Pegasus. The exploit was originally identified by the Citizen Lab, a research group at the University of Toronto.

The spyware was used to attack a small number of Apple users worldwide with dangerous malware and spyware. Apple’s lawsuit seeks to ban NSO Group from further harming individuals by using Apple’s products and services. The lawsuit also seeks redress for NSO Group’s flagrant violations of US federal and state law, arising out of its efforts to target and attack Apple and its users.

NSO Group and its clients devote the immense resources and capabilities of nation-states to conduct highly targeted cyberattacks, allowing them to access the microphone, camera, and other sensitive data on Apple and Android devices. To deliver FORCEDENTRY to Apple devices, attackers created Apple IDs to send malicious data to a victim’s device — allowing NSO Group or its clients to deliver and install Pegasus spyware without a victim’s knowledge. Though misused to deliver FORCEDENTRY, Apple servers were not hacked or compromised in the attacks.

Apple makes the most secure mobile devices on the market, and constantly invests in strengthening privacy and security protections for its users. For example, researchers have found that other mobile platforms have 15 times more malware infections than iPhone,2 and a recent study showed that less than 2 percent of mobile malware targets iOS devices.

iOS 15 includes a number of new security protections, including significant upgrades to the BlastDoor security mechanism. While NSO Group spyware continues to evolve, Apple has not observed any evidence of successful remote attacks against devices running iOS 15 and later versions. Apple urges all users to update their iPhone and always use the latest software.

“At Apple, we are always working to defend our users against even the most complex cyberattacks. The steps we’re taking today will send a clear message: In a free society, it is unacceptable to weaponize powerful state-sponsored spyware against those who seek to make the world a better place,” said Ivan Krstić, head of Apple Security Engineering and Architecture.

“Our threat intelligence and engineering teams work around the clock to analyze new threats, rapidly patch vulnerabilities, and develop industry-leading new protections in our software and silicon. Apple runs one of the most sophisticated security engineering operations in the world, and we will continue to work tirelessly to protect our users from abusive state-sponsored actors like NSO Group.”
Apple’s Continuing Efforts to Protect Its Users

Apple commends groups like the Citizen Lab and Amnesty Tech for their groundbreaking work to identify cybersurveillance abuses and help protect victims.

To further strengthen efforts like these, Apple will be contributing $10 million, as well as any damages from the lawsuit, to organizations pursuing cybersurveillance research and advocacy.

Apple will also support the accomplished researchers at the Citizen Lab with pro-bono technical, threat intelligence, and engineering assistance to aid their independent research mission, and where appropriate, will offer the same assistance to other organizations doing critical work in this space.

“Mercenary spyware firms like NSO Group have facilitated some of the world’s worst human rights abuses and acts of transnational repression, while enriching themselves and their investors,” said Ron Deibert, director of the Citizen Lab at the University of Toronto. “I applaud Apple for holding them accountable for their abuses, and hope in doing so Apple will help to bring justice to all who have been victimized by NSO Group’s reckless behavior.”

Apple is notifying the small number of users that it discovered may have been targeted by FORCEDENTRY. Any time Apple discovers activity consistent with a state-sponsored spyware attack, Apple will notify the affected users in accordance with industry best practices.

Apple believes privacy is a fundamental human right, and security is a constant focus for teams across the company. For years, Apple has led the industry with new protections to disrupt sophisticated attacks and defend its users, including features such as pointer authentication codes (PAC), BlastDoor, and the Page Protection Layer (PPL). For more information about Apple’s platform security, visit support.apple.com/guide/security/welcome/web.

Apple Notified State Department Employees of Phone Hacking Linked To NSO Group Software

Foreign service officers in Uganda among those informed their iPhones were compromised in attack.

Apple Inc. last week notified 11 U.S. State Department employees in Uganda that their iPhones were hacked, and investigators have linked the attack to a tool developed by NSO Group, an Israeli technology company that was blacklisted by the Biden administration, according to a person familiar with the matter.

Some of the targeted State Department employees were foreign service officers who are U.S. citizens, while others appear to be locals working for the embassy, the person familiar with the matter said. The hacked phones were linked to State Department email addresses, the person said.

The alerts appear to be the first confirmed cases of NSO Group’s mobile hacking tool, known as Pegasus, being used to successfully target American officials.

The Biden administration last month placed NSO Group on an export prohibition list that restricts the firm from obtaining some types of technology from the U.S. That came after a recent series of articles published by a global consortium of journalism organizations alleged that Pegasus, one of NSO Group’s main software intrusion tools, has been used by dozens of law-enforcement and intelligence customers around the world to target and break into cellphones belonging to politicians, human-rights activists and journalists.

“Once the inquiry was received, and before any investigation under our compliance policy, we have decided to immediately terminate relevant customers’ access to the system, due to the severity of the allegations,” NSO Group said in a statement. “To this point, we haven’t received any information nor the phone numbers, nor any indication that NSO’s tools were used in this case.”

NSO Group didn’t identify the customer or customers whose access to its tools were terminated and said it would cooperate with any relevant government authorities investigating the matter. Apple has a policy of notifying users it suspects have been targeted by state-sponsored attackers.

Those notifications don’t include who was behind the effort. Reuters first reported that at least nine State Department employees had been hacked by an unknown NSO Group customer.

The State Department declined to confirm the specific allegations, but said it closely monitors the cybersecurity conditions of its workers.

Apple last week sued NSO Group, alleging the company had engaged in “concerted efforts in 2021 to target and attack Apple customers, Apple products and servers and Apple through dangerous malware and spyware.” The suit seeks to bar NSO Group from using Apple’s products. It follows a similar lawsuit that the WhatsApp messaging service brought in 2019 alleging NSO Group had sent malware to 1,400 of its users. WhatsApp is owned by Meta Platforms Inc., formerly known as Facebook Inc.

NSO Group has said its technology has been used to save lives around the globe by helping law enforcement and intelligence agencies in countries that respect privacy and the rule of law to pursue terrorists and other criminals. The company has also said it has terminated contracts with governments that have abused its software and taken steps to prevent abuse.

But that has not appeased the company’s critics, who have for years accused NSO Group of being one of the most prominent vendors in an expanding commercial marketplace for hacking tools. While some governments often develop their own hacking tools at intelligence agencies like the National Security Agency, others have increasingly sought to purchase digital surveillance tools from companies that specialize in building and selling them.

“Companies that enable their customers to hack U.S. government employees are a threat to America’s national security and should be treated as such by the government,” Sen. Ron Wyden, a Democrat on the Senate Intelligence Committee who has advocated for a crackdown on hacking tool vendors like NSO Group, said Friday in response to news of the State Department notifications.

NSO Group has said that there are certain restrictions on the use of its tools, including that they are blocked from working on U.S. phone numbers. In its statement Friday, the firm acknowledged that “once the software is sold to the licensed customer, NSO has no way to know who the targets of the customers are, as such, we were not and could not have been aware of this case.”

Pegasus spyware allows pervasive surveillance once a phone is compromised, essentially creating a silent spying device that can access a phone’s files and messages as well as its microphone and camera. To install it, the NSO Group has developed a number of sophisticated techniques, including one “zero-click” method discovered earlier this year that could infect an iPhone without requiring the owner to click a link or open a file, according to researchers who have studied the software.

Related Articles:

Massive Encrypted Cellphone Hack Gave Police A Window On Cocaine, Cash And Killers

GoDaddy Breached – Plaintext Passwords – 1.2M Affected!!

Amazon’s Twitch Hack Shows Top Gamers Rake In Six-Figure Payouts

The Mercenary Threat of U.S. Hackers-for-Hire

A Hospital Hit By Hackers, A Baby In Distress: The Case Of The First Alleged Ransomware Death

Google’s Chrome Browser Is Under Active Attack, Patch Now!!!!

How Hackers Use Our Brains Against Us And How We Can Fight Back

AT&T 5G Upgrade Risks Silencing Home Alarms Reliant On Old Tech

Coinbase Users Angry With Customer Support After Funds Disappear From Accounts

Apple Cyber Flaw Allows Silent iPhone Hack Through iMessage

Biden Urges CEOs To Improve U.S. Cybersecurity After Attacks

How Hackers Hammered Australia After China Ties Turned Sour

Electric Vehicle Infrastructure Push Brings Cyber Concerns

Hacker Claims To Steal Data Of 100 Million T-Mobile Customers

Accenture Confirms Hack After LockBit Ransomware Data Leak Threats

CIA Weighs Creating Special China Unit In Bid To Out-Spy Beijing

Israel’s Mossad Intelligence Agency Is Seeking To Hire A Crypto Expert

US Taps Amazon, Google, Microsoft, Others To Help Fight Ransomware, Cyber Threats

US Drops Visa Fraud Cases Against Five Chinese Researchers

Want To Invest In Cybersecurity? Here Are Some ETFs To Consider

How To Protect Your Online Privacy While Working From Home

What Hackers Can Learn About You From Your Social-Media Profile

Biden Administration Blames Hackers Tied To China For Microsoft CyberAttack Spree

US Fights Ransomware With Crypto Tracing, $10 Million Bounties

Faces Are The Next Target For Fraudsters

Russia ‘Cozy Bear’ Breached GOP As Ransomware Attack Hit

Advertising Company Will Use Its Billboards To Track Passing Cellphones

REvil Ransomware Hits 200 Companies In MSP Supply-Chain Attack

What It Will Take To Protect Cities Against Cyber Threats

Home Security Company ADT Betting On Google Partnership To Build Revenue

Carnegie Cyber Kids Academy. World’s Most Prestigious Cyber Defense Training Facility

How To Opt Out Of Amazon’s Bandwidth-Sharing Sidewalk Network

Carnival Discloses Breach of Personal Data On Guests And Crew

UK Cyber Chief Cameron Says Ransomware Key Online Threat

The FBI Secretly Ran The Anom Messaging Platform, Yielding Hundreds Of Arrests In Global Sting

Federal Reserve Hacked More Than 50 Times In 4 Years

All of JBS’s US Beef Plants Were Forced Shut By Cyberattack

It Wasn’t Until Anonymous Payment Systems That Ransomware Became A Problem

How To Use Ian Coleman’s BIP39 Tool For Finding Bitcoin Addresses And Private Keys From A Seed Phrase

A New Ransomware Enters The Fray: Epsilon Red

This Massive Phishing Campaign Delivers Password-Stealing Malware Disguised As Ransomware

Biden Proposes Billions For Cybersecurity After Wave of Attacks

Mobile Crypto ‘Mining’ App Possibly Connected To Personal Data Leak

Ireland Confirms Second Cyber Attack On Health System

US Unveils Plan To Protect Power Grid From Foreign Hackers

Hackers Breach Thousands of Security Cameras, Exposing Tesla, Jails, Hospitals

A Hacker Was Selling A Cybersecurity Exploit As An NFT. Then OpenSea Stepped In

Clubhouse And Its Privacy & Security Risk

Using Google’s ‘Incognito’ Mode Fails To Prevent Tracking

Kia Motors America Victim of Ransomware Attack Demanding $20M In Bitcoin, Report Claims

The Long Hack: How China Exploited A U.S. Tech Supplier

Clubhouse Users’ Raw Audio May Be Exposed To Chinese Partner

Hacker Changed Chemical Level In Florida City’s Water System

UK Merger Watchdog Suffers 150 Data Breaches In Two Years

KeepChange Foils Bitcoin Theft But Loses User Data In Sunday Breach

Hacker Refuses To Hand Police Password For Seized Wallet With $6.5M In Bitcoin

SonicWall Says It Was Victim of ‘Sophisticated’ Hack

Tor Project’s Crypto Donations Increased 23% In 2020

Read This Now If Your Digital Wallet Which Holds Your Crypto-currencies Can Be Accessed Through Cellular, Wifi, Or Bluetooth

Armed Robbers Steal $450K From Hong Kong Crypto Trader

Is Your iPhone Passcode Off Limits To The Law? Supreme Court Ruling Sought

Researchers Warn 3 Apps Have Been Stealing Crypto Undetected For A Year

Ways To Prevent Phishing Scams In 2020

The Pandemic Turbocharged Online Privacy Concerns

US Treasury Breached By Foreign-Backed Hackers

FireEye Hack Portends A Scary Era Of Cyber-Insecurity

How FinCEN Became A Honeypot For Sensitive Personal Data

Apple And Google To Stop X-Mode From Collecting Location Data From Users’ Phones

Surge In Physical Threats During Pandemic Complicates Employee Security Efforts

Imagine A Nutrition Label—for Cybersecurity

Cybercriminals Attack GoDaddy-based Cryptocurrency Platforms

Biden Team Lacks Full U.S. Cybersecurity Support In Transition Fracas

Nasdaq To Buy Anti-Financial Crime Firm Verafin For $2.75 Billion

Mysterious Software Bugs Were Used To Hack iPhones and Android Phones and No One Will Talk About It

Dark Web Hackers Say They Hold Keys To 10,000 Robinhood Accounts #GotBitcoin

Hackers Steal $2.3 Million From Trump Wisconsin Campaign Account

Crypto Scammers Deface Trump Campaign Website One Week From Elections

Telecoms Protocol From 1975 Exploited To Target 20 Crypto Executives

With Traders Far From Offices, Banks Bring Surveillance To Homes

Financial Systems Set Up To Monitor Unemployment Insurance Fraud Are Being Overloaded (#GotBlockchain?)

A Millionaire Hacker’s Lessons For Corporate America

Container Shipping Line CMA CGM Says Data Possibly Stolen In Cyberattack

Major Hospital System Hit With Cyberattack, Potentially Largest In U.S. History

Hacker Releases Information On Las Vegas-Area Students After Officials Don’t Pay Ransom

Russian Troll Farms Posing As African-American Support For Donald Trump

US Moves To Seize Cryptocurrency Accounts Linked To North Korean Heists

These Illicit SIM Cards Are Making Hacks Like Twitter’s Easier

Uber Exec Allegedly Concealed 2016 Hack With $100K BTC ‘Bug Bounty’ Pay-Off

Senate Panel’s Russia Probe Found Counterintelligence Risks In Trump’s 2016 Campaign

Bockchain Based Surveillance Camera Technology Detects Crime In Real-Time

Trump Bans TicToc For Violating Your Privacy Rights While Giving US-Based Firm Go Ahead (#GotBitcoin?)

Facebook Offers Money To Reel In TikTok Creators

How A Facebook Employee Helped Trump Win—But Switched Sides For 2020

Facebook Rebuffs Barr, Moves Ahead on Messaging Encryption

Facebook Ad Rates Fall As Coronavirus Undermines Ad Spending

Facebook Labels Trump Posts On Grounds That He’s Inciting Violence

Crypto Prediction Markets Face Competition From Facebook ‘Forecasts’ (#GotBitcoin?)

Coronavirus Is The Pin That Burst Facebook And Google Online Ads Business Bubble

OpenLibra Plans To Launch Permissionless Fork Of Facebook’s Stablecoin (#GotBitcoin?)

Facebook Warns Investors That Libra Stablecoin May Never Launch (#GotBitcoin?)

FTC Approves Roughly $5 Billion Facebook Settlement (#GotBitcoin?)

How Facebook Coin’s Big Corporate Backers Will Profit From Crypto

Facebook’s Libra Is Bad For African Americans (#GotBitcoin?)

A Monumental Fight Over Facebook’s Cryptocurrency Is Coming (#GotBitcoin?)

Alert! 540 Million Facebook Users’ Data Exposed On Amazon Servers (#GotBitcoin?)

Facebook Bug Potentially Exposed Unshared Photos of Up 6.8 Million Users (#GotBitcoin?)

Facebook Says Millions of Users’ Passwords Were Improperly Stored in Internal Systems (#GotBitcoin?)

Advertisers Allege Facebook Failed to Disclose Key Metric Error For More Than A Year (#GotBitcoin?)

Ad Agency CEO Calls On Marketers To Take Collective Stand Against Facebook (#GotBitcoin?)

Thieves Can Now Nab Your Data In A Few Minutes For A Few Bucks (#GotBitcoin?)

New Crypto Mining Malware Beapy Uses Leaked NSA Hacking Tools: Symantec Research (#GotBitcoin?)

Equifax, FICO Team Up To Sell Your Financial Data To Banks (#GotBitcoin?)

Cyber-Security Alert!: FEMA Leaked Data Of 2.3 Million Disaster Survivors (#GotBitcoin?)

DMV Hacked! Your Personal Records Are Now Being Transmitted To Croatia (#GotBitcoin?)

Lithuanian Man Pleads Guilty In $100 Million Fraud Against Google, Facebook (#GotBitcoin?)

Hack Alert! Buca Di Beppo, Owned By Earl Enterprises Suffers Data Breach Of 2M Cards (#GotBitcoin?)

SEC Hack Proves Bitcoin Has Better Data Security (#GotBitcoin?)

Maxine Waters (D., Calif.) Rises As Banking Industry’s Overseer (#GotBitcoin?)

FICO Plans Big Shift In Credit-Score Calculations, Potentially Boosting Millions of Borrowers (#GotBitcoin?)

Our Facebook Page

Your Questions And Comments Are Greatly Appreciated.

Monty H. & Carolyn A.

Go back

Leave a Reply