• AutoTL;DRB
    link
    English
    11 year ago

    This is the best summary I could come up with:


    The zero-click zero-day exploit had been used to install NGO Group’s Pegasus spyware onto an iPhone owned by an employee of a Washington DC-based civil society organization.

    The spyware infects a phone and sends back data, including photos, messages, and audio / video recordings.

    Apple has now released iOS 16.6.1 just days after the discovery of this exploit and it’s crucial for iPhone owners to install this update, even if they’re not likely to be targeted with spyware.

    There are still plenty of groups willing to reverse engineer iOS security updates to try and discover how to exploit this new vulnerability, raising the risk of broader attacks.

    Citizen Lab hasn’t provided a full breakdown of the vulnerability for obvious reasons, but the exploit involves PassKit — the framework behind Apple Pay and Wallet — attachments that are loaded with malicious images sent via iMessage.

    iOS vulnerabilities have regularly made headlines in recent years, especially ones that have been actively exploited before Apple was aware of the security flaw.


    The original article contains 304 words, the summary contains 168 words. Saved 45%. I’m a bot and I’m open source!