Apple watengeneza programu ya kuzuia udukuzi unaoweza kufanywa kwa vifaa vyake bila ya mtumiaji kubonyeza 'link'

The Sheriff

JF-Expert Member
Oct 10, 2019
Apple imezindua programu ya dharura ili kukabiliana na hatari ya kiusalama kwa bidhaa zake kuzuia kile kinachoitwa "zero-click, ikiwa ni baada ya watafiti wa usalama kugundua kasoro ambayo inawaruhusu wadukuzi kuvifikia vifaa kupitia huduma ya iMessage hata bila watumiaji kubonyeza kiungo (link) au faili.

Citizen Lab, kikundi cha waangalizi wa usalama katika Chuo cha Toronto, kiligundua kwamba Kampuni ya udukuaji ya Israeli iitwayo NSO, ilikuwa nyuma ya shambulio hilo.

Katika taarifa kwa shirika la habari la Reuters, NSO haikuthibitisha au kukana kwamba ilikuwa nyuma ya shambulio, bali ilisema tu kwamba itaendelea kuvipatia vyombo vya ujasusi na wasimamiaji wa sheria kote ulimwenguni teknolojia za kupambana na ugaidi na uhalifu.

Wataalam wa usalama wamesema kuwa ingawa ugunduzi huo ni muhimu, watumiaji wengi wa vifaa vya Apple hawapaswi kuwa na wasiwasi kupita kiasi kwani mashambulio huwa yanashughulikiwa kwa viwango vya juu.


Apple has issued a software patch to block so-called "zero-click" spyware that could infect iPhones and iPads

Independent researchers identified the flaw, which lets hackers access devices through the iMessage service even if users do not click on a link or file.

The problem affects all of the technology giant's operating systems, the researchers said.

Apple said it issued the security update in response to a "maliciously crafted" PDF file.

University of Toronto's Citizen Lab, which first highlighted the issue, had previously found evidence of zero-click spyware, but "this is the first one where the exploit has been captured so we can find out how it works," said researcher Bill Marczak.

The researchers said that the previously unknown vulnerability affected all major Apple devices, including iPhones, Macs and Apple Watches.

Citizen Lab also said the security issue was exploited to plant spyware on a Saudi activist's iPhone, adding that it had high confidence that the Israeli hacker-for-hire firm, NSO Group, was behind that attack.

In a statement to the Reuters news agency, NSO did not confirm or deny that it was behind the spyware, saying only that it would "continue to provide intelligence and law enforcement agencies around the world with life-saving technologies to fight terror and crime".

Security experts have said that although the discovery is significant, most users of Apple devices should not be overly concerned as such attacks are usually highly targeted.

Apple said in a blog post that it had issued the iOS 14.8 and iPadOS 14.8 software patches after it became aware of a report that the flaw "may have been actively exploited".

The announcement came as the technology giant prepared to unveil new devices at its annual launch event on Tuesday.

The company is expected to reveal new iPhones and updates to its AirPods and Apple Watch.

Analysis by Joe Tidy, Cyber Reporter

Apple's iMessage is one of the most secure messaging apps in the world but clearly it had a dangerous weakness that a hacking team found and exploited.

The news will embarrass Apple which prides itself on being a secure and safe system.

The revelation is potentially another blow to the reputation of NSO Group which is still reeling from recent accusations of widespread spy hacks on innocent people.

It also highlights once again that no device is fully safe if a determined, well-funded team wants to hack it and is paid enough to do so.

The good advice from all corners is for iOS users to update the security software of their devices as soon as possible to patch up the security hole.

But for the vast majority of users, the risk of being a target of this expensive and highly-skilled hacking, is low.

Source: BBC

Analogia Malenga

JF-Expert Member
Feb 24, 2012
NSO Group ambao ni watengenezaji wa Pegasus wanasadikika kutengeneza spyware yao kuweza kuingia kwenye mifumo ya iphones bila hata kubofywa, hali iliyozua taharuki kwa watumiaji wa simu hizo ambazo mythically waliamini haziwezi kudukuliwa kwa sababu kampuni ya apple imejijengea sifa ya kuwekeza kwenye ulinzi wa data za watumiaji wake.

Kampuni ya Apple imetengeneza software update ya dharura ya kuweza kuzuia kupenya kwa malware iliyotengenezwa na NSO Group ambayo ina uwezo wa kuathiri iphones, imacs na smart watches.

Apple wamefanikiwa kugundua mwanya ambao NSO walifanikiwa kuutumia na kuingia katika mifumo ya mteja wao wa iphone ambaye ni mwandishi wa habari nchini Saudi Arabia.

Hata hivyo, wanateknolojia wamethibitisha malware hii ni ya gharama kubwa sana na hutumika kumlenga mtu mmoja hivyo wamewatoa wasiwasi watumiaji wake wengi kwamba hawako kwenye hatari hii.

NSO group walipotafutwa kutoa maelezo juu ya malware hii, hawajaweka wazi kuhusika moja kwa moja na tukio hili.
Wameeleza kwamba kampuni yao hutengeneza malware kwa malengo mazuri ya kusaidia kukabiliana na makundi ya kigaidi.


Apple has issued an emergency software update after a flaw was found that allows spyware attributed to Israel's NSO Group to infect an iPhone, Apple Watch, or Mac computer without the user having to click on anything.

The malware was found on the phone of an unidentified Saudi activist by Canadian internet security watchdog Citizen Lab.

It is the first time that a "zero-click" exploit - which affects all of the phone's operating systems - has been caught and analysed.

The phone is thought to have been infected in February, although the researchers discovered the malicious code on 7 September and immediately alerted Apple.

The logo of Israeli cyber firm NSO Group is seen at one of its branches in the Arava Desert, southern Israel July 22, 2021. REUTERS/Amir Cohen
Image: NSO Group is an Israeli cyber surveillance firm

Ivan Krstić, head of Apple security engineering and architecture, said: "After identifying the vulnerability used by this exploit for iMessage, Apple rapidly developed and deployed a fix in iOS
14.8 to protect our users.

"Attacks like the ones described are highly sophisticated, cost millions of dollars to develop, often have a short shelf life, and are used to target specific individuals."

"While that means they are not a threat to the overwhelming majority of our users, we continue to work tirelessly to defend all our customers, and we are constantly adding new protections for their devices and data," he added.
More from Science & Tech

Citizen Lab researcher Bill Marczak said there was high confidence that Israeli surveillance firm NSO Group was behind the attack, although it was "not necessarily" being attributed to the Saudi government.

In a statement to Reuters, NSO did not confirm or deny that it was behind the technique, saying only that it would "continue to provide intelligence and law enforcement agencies around the world with life-saving technologies to fight terror and crime".

Citizen Lab has previously found evidence of zero-click malware being used to hack the phones of some journalists and other targets but Mr Marczak said this was the first time one had been captured "so we can find out how it works".

A man reads at a stand of the NSO Group Technologies, an Israeli technology firm known for its Pegasus spyware enabling the remote surveillance of smartphones, at the annual European Police Congress in Berlin, Germany, February 4, 2020

Image: The average user does not need to be too concerned, as such attacks tend to be highly targeted

Security experts have said that the average user does not need to be too concerned, as such attacks tend to be highly targeted, but the exploit was still alarming.

Mr Marczak said that malicious files were put on the Saudi activist's phone via the iMessage app before the phone was hacked with NSO's Pegasus spyware.

This meant the phone was able to spy on its user, without them even knowing.

Citizen Lab researcher John Scott-Railton said: "Popular chat apps are at risk of becoming the soft underbelly of device security. Securing them should be top priority."

In July it was reported that NSO Group's spyware had been used to target journalists, political dissidents and human rights activists.

NSO Group says that its spyware is only used by governments to hack the mobile phones of terrorists and serious criminals, but a leaked list featuring more than 50,000 phone numbers of interest to the company's clients suggested that it is being used much more broadly.

More than 1,000 individuals in 50 countries were allegedly selected for potential surveillance - including 189 journalists and more than 600 politicians and government officials, according to Paris-based journalism non-profit Forbidden Stories and Amnesty International, as well as their media partners.

Mr Marczak said on Monday: "If Pegasus was only being used against criminals and terrorists, we never would have found this stuff."

It has also been reported that the FBI is investigating NSO Group, and Israel has set up a senior inter-ministerial team to examine the allegations surrounding how the spyware is being used.

Toa taarifa ya maudhui yasiyofaa!

Kuna taarifa umeiona humu JamiiForums na haifai kubaki mtandaoni?
Fanya hivi...

Umesahau Password au akaunti yako?

Unapata ugumu kuikumbuka akaunti yako? Unakwama kuanzisha akaunti?
Contact us

Top Bottom