Los Angeles Times

Apple boosts iPhone security

The upgrade comes after powerful spyware targets a human rights activist.

-

A botched attempt to break into an activist’s iPhone using hitherto unknown espionage software has triggered a global upgrade of Apple’s mobile operating system, researcher­s said Thursday.

The spyware took advantage of three previously undisclose­d weaknesses in Apple’s mobile operating system to take control of iPhone devices, according to reports published Thursday by the San Francisco-based Lookout smartphone security company and Internet watchdog group Citizen Lab. Both reports pointed to the NSO Group, an Israeli company with a reputation for flying under the radar, as the author of the spyware.

“The threat actor has never been caught before,” said Mike Murray, a researcher with Lookout, describing the program as “the most sophistica­ted spyware package we have seen in the market.”

The reports issued by Lookout and Citizen Lab — based at the University of Toronto’s Munk School of Global Affairs — outlined how an iPhone could be compromise­d with the tap of a finger, a trick so coveted in the world of cyberespio­nage that in November a spyware broker said it had paid a $1million bounty to programmer­s who had found a way to do it.

Such a compromise would give hackers full control over the phone, enabling them to eavesdrop on calls, harvest messages, activate cameras and microphone­s and drain the device of its personal data.

Apple said it fixed the vulnerabil­ity immediatel­y after learning about it, but the security hole may have gone unpatched had it not been for the wariness of a human rights activist in the United Arab Emirates.

Ahmed Mansoor alerted Citizen Lab to the spyware after receiving an unusual text message Aug. 10. Promising to reveal details about torture in the United Arab Emirates’ prisons, the unknown sender included a suspicious-looking link at the bottom of the message.

Mansoor wasn’t convinced. Not only had he been imprisoned, beaten, robbed and had his passport confiscate­d by the authoritie­s over the years, he also had repeatedly found himself in the crosshairs of electronic eavesdropp­ing operations.

When Mansoor shared the suspicious text message with Citizen Lab researcher Bill Marczak, they realized he’d been targeted again.

Marczak, who had already been looking into the NSO Group, said he and fellow researcher John ScottRailt­on turned to Lookout for help picking apart the malicious program, a process which Murray compared to “defusing a bomb.”

“It is amazing the level they’ve gone through to avoid detection,” he said of the software’s makers. “They have a hair-trigger self-destruct.”

The researcher­s found that Mansoor had been targeted by a sophistica­ted piece of software that probably cost a small fortune.

In a statement that stopped short of acknowledg­ing that the spyware was its own, the NSO Group said its mission was to provide “authorized government­s with technology that helps them combat terror and crime.” The company said it had no knowledge of any particular incidents.

The apparent discovery of Israeli-made spyware being used to target a dissident in the United Arab Emirates raises awkward questions for both countries.

The use of Israeli technology to police its own citizens is an uncomforta­ble strategy for an Arab country with no formal diplomatic ties to the Jewish state. And Israeli complicity in a cyberattac­k on an Arab dissident would seem to run counter to the country’s self-descriptio­n as a bastion of democracy in the Middle East.

Authoritie­s in both countries did not return calls seeking comment.

Newspapers in English

Newspapers from United States