Apple will alert users exposed to state-sponsored spyware attacks

Posted:
in General Discussion edited November 2021
As part of Apple's initiative to battle state-sponsored spyware, or more specifically the surveillance and monitoring of Apple device owners, the company is introducing a system that will alert users when they are believed to be targets of such attacks.

Threat Notification


On Tuesday, Apple announced that it filed suit against NSO Group and its parent company over the creation and deployment of the Pegasus spyware.

Ostensibly developed to aid in law enforcement campaigns, Pegasus relies on vulnerabilities, like the now-patched FORCEDENTRY exploit, to install a surveillance package capable of granting access to iOS and Android device microphones and cameras, as well as onboard data. The tool is sold -- allegedly indiscriminately -- to governments with poor human rights track records, who have in the past used it to monitor journalists, activists, researchers, politicians and other targets of interest.

Apple said it is notifying a "small number of users" who were targeted by FORCEDENTRY, and promised to continue to alert customers if and when future attacks are detected.

"Any time Apple discovers activity consistent with a state-sponsored spyware attack, Apple will notify the affected users in accordance with industry best practices," the company said.

The system is already active, as a Reuters report on Wednesday details alert messages that were sent to at least six Thai activists and researchers.

Apple explains threat notifications in a support document. While the inherent nature of state-sponsored attacks -- expensive, complex and highly targeted -- precludes most users from being exposed, Apple says that if one of its customers is affected they can expect to be informed in two ways: a prominent alert notification displayed at the top of the Apple ID website and alerts sent via email and iMessage to the address and phone number associated with an Apple ID.

Notifications from Apple will never ask users to click links, open files, install apps or profiles, or provide their Apple ID password or verification code by email or on the phone, the company says. Those who receive a threat notification can verify its authenticity by visiting the Apple ID portal, where an identical alert will appear should the message be genuine.

The tech giant acknowledges that false alarms are possible and that the system might not detect all attacks. As a precaution, users are urged to follow these best practices:
  • Update devices to the latest software, as that includes the latest security fixes

  • Protect devices with a passcode

  • Use two-factor authentication and a strong password for Apple ID

  • Install apps from the App Store

  • Use strong and unique passwords online

  • Don't click on links or attachments from unknown senders
In addition to the notification service, Apple is providing technical, threat intelligence and engineering assistance to Citizen Lab, the group that first identified FORCEDENTRY, and will offer the same assistance to similar security research organizations. The company is also donating $10 million and any damages won in its suit against NSO to cybersurveillance research and advocacy organizations.

Read on AppleInsider

Comments

  • Reply 1 of 7
    “Install apps from the App Store”. Either this is a duh don’t jailbreak your phone if you’re a journalist in a dangerous country or a prelude to possible alternate App Stores  ¯\_(ツ)_/¯ 
    watto_cobra
  • Reply 2 of 7
    roakeroake Posts: 811member
    Anilu_777 said:
    “Install apps from the App Store”. Either this is a duh don’t jailbreak your phone if you’re a journalist in a dangerous country or a prelude to possible alternate App Stores  ¯\_(ツ)_/¯ 
    It’s accurately saying you are taking unnecessary security risks by side-loading onto jailbroken phones.
    scstrrfbaconstangwatto_cobra
  • Reply 3 of 7
    Anilu_777 said:
    “Install apps from the App Store”. Either this is a duh don’t jailbreak your phone if you’re a journalist in a dangerous country or a prelude to possible alternate App Stores  ¯\_(ツ)_/¯ 

    I took it that they were talking about Macs -- where side loading apps has been the predominant method.
    watto_cobra
  • Reply 4 of 7
    Oh Boy!   Here come the scams!
    "Your iPhone has been compromised by state-sponsered spyware.  They are watching and listening to your every move.  They know where you live, the names of your children and where they go to school.  Click this link immediately so Apple can fix this for you."
    macplusplus
  • Reply 5 of 7
    So who was the state sponsoring these cyber crimes?   The one who let the software be built and used it themselves?   Or the ones who bought from them?
    macplusplus
  • Reply 6 of 7
    Anilu_777 said:
    “Install apps from the App Store”. Either this is a duh don’t jailbreak your phone if you’re a journalist in a dangerous country or a prelude to possible alternate App Stores  ¯\_(ツ)_/¯ 
    I took this to mean don’t side load apps.  Certain organizations have enterprise certificates which enable side loading in exceptional cases:

    https://appleinsider.com/articles/19/01/30/apple-has-revoked-facebooks-enterprise-developer-certificates-after-sideload-violations

    This can be one source of apps downloadable from outside the App Store.  Another I think is through Test Flight, which gives a developer an avenue to let a small set of users “beta” test an app before it goes onto the App Store.
    watto_cobra
  • Reply 7 of 7
    maltzmaltz Posts: 453member
    I'm going to go out on a limb and assume that this does not apply to the day-to-day surveillance done against Chinese citizens.
Sign In or Register to comment.