

The FORCEDENTRY exploit was supposedly developed to bypass Apple's security updates that were patched in the BlastDoor security system.Ĭitizen Lab sent its discoveries to Apple on September 7th, and the Cupertino company after analyzing the samples, confirmed that the files contained a zero-day exploit that impacted iOS and macOS devices. The latest beta version of iOS and iPadOS, 16.0 beta 6, was released on August 15, 2022. The security group says the mitigation may have been actively used since February 2021. Attacks like the ones described are highly sophisticated, cost millions of dollars.
#Apple security update closes spyware iwatches software#
The security exploit targets Apple’s image rendering library, called CoreGraphics, causing an integer overflow. On Monday, Ivan Krsti, Apple’s head of security engineering and architecture commended Citizen Lab for its findings and urged customers to run the latest software updates for the fixes to take effect, by installing iOS 14.8, MacOS 11.6 and WatchOS 7.6.2. These weren't just zero-day attacks, but also zero-click exploits, meaning they needed no intervention from the user to infect the device. This was how the FORCEDENTRY exploit chain infected the device with the Pegasus surveillance tech.

The malicious files contained some arbitrary code that caused crashes on the phone, allowing it to be hacked. What's interesting here is that these files weren't actually GIFs, some of them were Adobe PSD files and others were PDFs.

AppleclosesiphonesiwatchessecurityspywareUpdate. The spyware, called Pegasus, used a novel method to invisibly infect an Apple. spyware company, had infected Apple products without so much as a click. GIF files were present in the phone's iMessage app, and these had been received just before the device had been compromised. Apple Security Update Closes Spyware Flaw in iPhones, Macs and iWatches. Citizen Lab extracted a backup of the device from iTunes, and began analyzing its contents.
