Apple issues update to fix dangerous iPhone, iPad security flaw

A thwarted attack on a human rights activist has prompted Apple to issue a patch to fix a security flaw in iPhones and iPads.

A customer compares iPhone models

Source: AAP

Apple has issued a patch to fix a dangerous security flaw in iPhones and iPads after researchers discovered that a prominent United Arab Emirates dissident's phone had been targeted with a previously unknown method of hacking.

The thwarted attack on the human rights activist, Ahmed Mansoor, used a text message that invited him to click on a web link. Instead of clicking, he forwarded the message to researchers at the University of Toronto's Citizen Lab.

The hack is the first known case of software that can remotely take over a fully up-to-date iPhone 6.

Experts at Citizen Lab worked with security company Lookout and determined that the link would have installed a program taking advantage of a three flaws that Apple and others were not aware of. The researchers disclosed their findings on Thursday.

"Once infected, Mansoor's phone would have become a digital spy in his pocket, capable of employing his iPhone's camera and microphone to snoop on activity in the vicinity of the device, recording his WhatsApp and Viber calls, logging messages sent in mobile chat apps, and tracking his movements," Citizen Lab wrote in a report released on Thursday.

The researchers said they had alerted Apple a week and a half ago, and the company developed a fix and distributed it as an automatic update to iPhone 6 owners.

Apple spokesman Fred Sainz confirmed that the company had issued the patch after being contacted by researchers.

The Citizen Lab team attributed the attack software to a private seller of monitoring systems, NSO Group, an Israeli company that makes software for governments which can secretly target mobile phones and gather information. Tools such as that used in this case, a remote exploit for a current iPhone, cost as much as $1 million.

NSO Chief Executive Shalev Hulio referred questions to spokesman Zamir Dahbash, who said the company "cannot confirm the specific cases" covered in the Citizen Lab and Lookout reports.

Dahbash said NSO sells within export laws to government agencies, which then operate the software.

"The agreements signed with the company's customers require that the company's products only be used in a lawful manner," he added. "Specifically, the products may only be used for the prevention and investigation of crimes."

Dahbash did not answer follow-up questions, including whether the exposure of the tools use against Mansoor in UAE and a Mexican journalist would end any sales to those countries.

NSO has kept a low profile in the security world, despite its 2014 sale of a majority stake for $120 million to California private equity firm Francisco Partners. That company's chief executive, Dipanjan Deb, did not return a call on Thursday. In November 2015, Reuters reported that NSO had begun calling itself "Q" and was looking for a buyer for close to $1 billion.

Sarah McKune, senior legal adviser to Citizen Lab, said Israel tries to follow the strictures of the Wassenaar Arrangement, which puts controls on the international sale of nuclear and chemical weapons technology and more recently cyber intrusion tools.

NSO may have had to apply for an export licence, she added, saying that raised questions about "what consideration was given to the human rights record of UAE."

The Israeli embassy in Washington did not respond to an email seeking comment.

NSO marketing material says that it also has capabilities for Android and BlackBerry devices. No version of the software has been exposed, indicating it remains effective.

Citizen Lab did not directly accuse UAE of carrying out the attack on Mansoor with NSO gear called Pegasus, but it said other NSO attacks on critics of the regime were connected to the government.

It also said a Mexican journalist and a minority party politician in Kenya had been targeted with NSO software and that domain names set up for other attacks referred to entities in Uzbekistan, Thailand, Saudi Arabia, Turkey, and other nations, suggesting that other targets lived in those nations.

A call to the UAE embassy in Washington was not immediately returned.

The market for "lawful intercept," or government hacking tools, has come under increased scrutiny with revelations about authoritarian customers and noncriminal victims.

Two popular vendors, Hacking Team of Italy and Gamma Group of the United Kingdom, have had their wares exposed by researchers or hackers.

Mansoor had previously been targeted with software from both of those companies, according to Citizen Lab.

"I can't think of a more compelling case of serial misuse of lawful intercept malware than the targeting of Mansoor," said one of the Citizen Lab researchers, John Scott-Railton.


Share
5 min read

Published

Updated

Source: AAP


Share this with family and friends


Get SBS News daily and direct to your Inbox

Sign up now for the latest news from Australia and around the world direct to your inbox.

By subscribing, you agree to SBS’s terms of service and privacy policy including receiving email updates from SBS.

Download our apps
SBS News
SBS Audio
SBS On Demand

Listen to our podcasts
An overview of the day's top stories from SBS News
Interviews and feature reports from SBS News
Your daily ten minute finance and business news wrap with SBS Finance Editor Ricardo Gonçalves.
A daily five minute news wrap for English learners and people with disability
Get the latest with our News podcasts on your favourite podcast apps.

Watch on SBS
SBS World News

SBS World News

Take a global view with Australia's most comprehensive world news service
Watch the latest news videos from Australia and across the world