Skip to Content

Israeli Hacking Firm Said to Be Behind Groundbreaking iOS Malware

NSO Group, a firm that trades in spyware, stands accused of peddling an unprecedented attack on iPhones.
August 26, 2016

Apple has rushed out a patch for its mobile operating system, iOS, after malware—reportedly developed by an Israeli firm that sells spying software to governments—was able to remotely surveil an up-to-date iPhone 6.

The attack attempts to encourage users to open a URL via text message. When that link is followed, the attack uses three individual zero-day flaws to leverage a weakness in Safari’s browser engine, which enables access to the operating system’s kernel and installation of malware to effectively jailbreak the iPhone. From that point on, the malware can be used to spy on virtually every aspect of the phone’s use, from phone calls and text messages to calendar data and video feeds.

This appears to be the first known example of hackers having the ability to remotely jailbreak an iPhone 6, and Motherboard claims that it’s the first iPhone attack of this kind. The vulnerability was identified by researchers at the University of Toronto's Citizen Lab after Ahmed Mansoor, a human rights activist and United Arab Emirates dissident, was targeted using the attack.

The Citizen Lab team claims that the malware was developed by the Israeli firm NSO Group, which creates spy software for governments. It’s no secret that NSO makes software capable of surveilling smartphones: in 2014, the Wall Street Journal reported that an NSO slide claimed to provide technology that “allows remote and stealth monitoring and full data extraction from remote devices via untraceable commands.” It’s currently unclear who exactly used the malware to target Mansoor.

Reuters suggests that such a piece of software, able to spy on an up-to-date iPhone 6, could retail for as much as $1 million.

Citizen Lab researchers informed Apple of the vulnerability over a week ago, and the iPhone maker has released a patch for devices running iOS 9. Apple claims devices running up-to-date beta versions of iOS 10 are unaffected.

Apple recently announced a bug-bounty program, which will see it pay out up to $200,000 for (invited) hackers who manage to identify the kinds of flaws leveraged by this malware. Perhaps it should’ve started sooner.

(Read more: Citizen Lab,  Reuters, Motherboard, "The Growth Industry Helping Governments Hack Terrorists, Criminals—and Political Opponents")

Keep Reading

Most Popular

Scientists are finding signals of long covid in blood. They could lead to new treatments.

Faults in a certain part of the immune system might be at the root of some long covid cases, new research suggests.

Large language models can do jaw-dropping things. But nobody knows exactly why.

And that's a problem. Figuring it out is one of the biggest scientific puzzles of our time and a crucial step towards controlling more powerful future models.

OpenAI teases an amazing new generative video model called Sora

The firm is sharing Sora with a small group of safety testers but the rest of us will have to wait to learn more.

Google’s Gemini is now in everything. Here’s how you can try it out.

Gmail, Docs, and more will now come with Gemini baked in. But Europeans will have to wait before they can download the app.

Stay connected

Illustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at customer-service@technologyreview.com with a list of newsletters you’d like to receive.