According to the research paper released by Citizen lab from University of Toronto  “The target was taken while he was reporting on Saudi Arabia and writing a book about Crown Prince Mohammed Bin Salman.” Institute reported that , the attack was not related to any specific Government.

NSO Group is thought to have used at least three different iOS exploits to date including the December 2019 iMessage Zero-Click Exploit, KISMET Exploits targeting iOS 13.5.1 and iOS 13.7 from July 2020 and Forced Exploit targeting iOS 14.x from February 2021 to 14.7.1.

BlastDoor framework It’s designed to make zero-click abuse more difficult for Apple’s iOS 14 update, but FORCEDENTRY clearly undermines the very security features built into the operating system, giving Apple Issue an update Fixed flaws in September 2021.

Earlier investigations in July indicated widespread abuse of the tool by several authoritarian governments to facilitate human rights violations all over the world. The revelation adds to a long list of documented cases of activists, journalists, and heads of state being targeted or hacked by the company’s “military-grade spyware.

After two previous unsuccessful attempts through SMS and WhatsApp in 2018, forensic investigation into the campaign revealed that Hubbard’s iPhone was successfully hacked with the surveillance software twice on July 12, 2020 and June 13, 2021, once each through the KISMET and FORCEDENTRY zero-click iMessage exploits.

The findings are also particularly significant in light of the US government’s new interim rules. necessary Before exporting such “cyber security items” to “national security or weapons of mass destruction” countries, companies working on intrusion software obtain a licence from the Ministry of Commerce.

“As long as we can save our lives on vulnerable devices and sell ways for surveillance companies to exploit them and earn millions of dollars, the government, in particular, requires our data.” If we make a decision, our defences will be limited.

Finally Hubbard concluded his points in the New York Times, “I’m now restricting the information I keep on my phone.” I frequently restart my phone. This may result in the activation of some spy programmes (although it may start). It is unstoppable). And, if at all possible, use one of the few non-hackable options. “I still have this problem: I misplace my phone and meet people face to face.”

–-For more Cyber security news in crisp content . Please follow our site via twitter handle @cyberworkx1, Linkedin handle @linkedin

Leave a Reply

Please log in using one of these methods to post your comment: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s