New flaw in Apple devices led to spyware infection, researchers say

By Christopher Bing and Zeba Siddiqui

(Reuters) -Researchers at digital watchdog group Citizen Lab said on Thursday they found spyware they linked to Israeli firm NSO that exploited a newly discovered flaw in Apple devices.

While inspecting the Apple device of an employee of a Washington-based civil society group last week, Citizen Lab said it found the flaw had been used to infect the device with NSO’s Pegasus spyware, it said in a statement.

“We attribute the exploit to NSO Group’s Pegasus spyware with high confidence, based on forensics we have from the target device,” said Bill Marczak, senior researcher at Citizen Lab, which is based at the University of Toronto’s Munk School of Global Affairs and Public Policy.

He said the attacker likely made a mistake during the installation which is how Citizen Lab found the spyware.

Citizen Lab said Apple confirmed to them that using the high security feature “Lockdown Mode” available on Apple devices blocks this particular attack.

“This shows that civil society is once again serving as the early warning system about really sophisticated attacks,” said John Scott-Railton, senior researcher at Citizen Lab.

Citizen Lab did not provide further details on the affected individual or the organization. 

The flaw allowed compromise of iPhones running the latest version of iOS (16.6) without any interaction from the victim, the digital watchdog said. The new update fixes this vulnerability.

Apple issued new updates on its devices after investigating the flaws reported by Citizen Lab. An Apple spokesperson said it had no further comment, while Citizen Lab urged consumers to update their devices.

NSO said in a statement, “We are unable to respond to any allegations that do not include any supporting research.”

The Israeli firm has been blacklisted by the U.S. government since 2021 for alleged abuses, including surveillance of government officials and journalists. 

(Reporting by Zeba Siddiqui and Christopher Bing; Editing by Jamie Freed and Daniel Wallis)

tagreuters.com2023binary_LYNXMPEJ860Z8-VIEWIMAGE