fedii.me
  • Communities
  • Create Post
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
OsrsNeedsF2P@lemmy.ml to Privacy@lemmy.ml · 2 years ago

0-Day Remote iPhone Full Access Being Abused, Update Immediately

citizenlab.ca

external-link
message-square
30
link
fedilink
  • cross-posted to:
  • [email protected]
254
external-link

0-Day Remote iPhone Full Access Being Abused, Update Immediately

citizenlab.ca

OsrsNeedsF2P@lemmy.ml to Privacy@lemmy.ml · 2 years ago
message-square
30
link
fedilink
  • cross-posted to:
  • [email protected]
BLASTPASS: NSO Group iPhone Zero-Click, Zero-Day Exploit Captured in the Wild - The Citizen Lab
citizenlab.ca
external-link
Citizen Lab found an actively exploited zero-click vulnerability being used to deliver NSO Group’s Pegasus mercenary spyware while checking the device of an individual employed by a Washington DC-based civil society organization with international offices. We refer to the exploit chain as BLASTPASS. The exploit chain was capable of compromising iPhones running the latest version of iOS (16.6) without any interaction from the victim.
alert-triangle
You must log in or register to comment.
  • OsrsNeedsF2P@lemmy.mlOP
    link
    fedilink
    arrow-up
    73
    ·
    2 years ago

    Couldn’t think of a better title, TL;DR via receiving an iMessage with a specially crafted image, an attacker can get full access to your device. Update iOS immediately to resolve the issue

    • fartsparkles@sh.itjust.works
      link
      fedilink
      arrow-up
      35
      ·
      2 years ago

      PSA: Android just published a patch for a very similar vulnerability in their September Security release. You should update your Android devices ASAP.

      • 🅵🅴🅳🅴🆁🅰🅻🅰🅻🅸🅴🅽🆂🅼🆄🅶🅶🅻🅴🆁@feddit.de
        link
        fedilink
        English
        arrow-up
        14
        ·
        2 years ago

        Which CVE is that and where can i read a description of how this vulnerability is being used?

        • fartsparkles@sh.itjust.works
          link
          fedilink
          arrow-up
          6
          ·
          2 years ago

          CVE-2023-35674 No real details published yet but Google discussed it in their September security bulletin.

    • Doc Blaze@lemmy.world
      link
      fedilink
      arrow-up
      4
      arrow-down
      75
      ·
      2 years ago

      I feel like people who are naive enough to have auto download MMS on from random numbers deserve their devices hacked anyway. Does this affect people who dont have auto download MMS on? I usually just delete the text before it even downloads any attachments.

      • El Barto@lemmy.world
        link
        fedilink
        arrow-up
        51
        arrow-down
        1
        ·
        edit-2
        2 years ago

        Get off that high horse.

      • prowess2956@kbin.social
        link
        fedilink
        arrow-up
        20
        ·
        2 years ago

        How do you block MMS from unknown senders on iOS?

        • Drunemeton@lemmy.world
          link
          fedilink
          English
          arrow-up
          6
          ·
          2 years ago

          Settings > Messages > SMS/MMS > MMS Messaging (uncheck)

          And/Or

          Message Filtering > Filter Unknown Senders (checked)

          Those seem to be the likely options, but I’ve zero idea if those will work.

        • Doc Blaze@lemmy.world
          link
          fedilink
          arrow-up
          1
          arrow-down
          2
          ·
          2 years ago

          sorry, I was meaning to reply on the android comment to the post I actually commented on.

      • mishimaenjoyer@kbin.social
        link
        fedilink
        arrow-up
        12
        ·
        edit-2
        2 years ago

        at this point most iphone users are very much used to reicive images within imessage and have already forgotten that mms existed or are too young to actually ever had to deal with it, so to them it’s just yet another picture.

        • Doc Blaze@lemmy.world
          link
          fedilink
          arrow-up
          1
          arrow-down
          5
          ·
          2 years ago

          you are correct. I was meaning to imply harshly that people should not have auto download MMS on, though. Too many remain blissfully ignorant and uncaring about their own security to even go through options and change the defaults.

          • Ado@lemmy.world
            link
            fedilink
            arrow-up
            4
            ·
            2 years ago

            lol, even if people went through to change their defaults, why would they expect an image to be able to hijack their device?

            There’s so many automated things on smart phones nowadays, should we disable everything to ensure avoiding future exploits?

            • Dontfearthereaper123@lemm.ee
              link
              fedilink
              arrow-up
              2
              arrow-down
              1
              ·
              2 years ago

              They would expect an image to hijack their device because they’ve been warned about downloading attachments in basically every Internet safety anything. We should disable things like nfc and other security vulnerabilities when not in use, it doesn’t take a genius to figure out which can be dangerous.

      • SatansMaggotyCumFart@lemmy.world
        link
        fedilink
        arrow-up
        6
        arrow-down
        1
        ·
        2 years ago

        I’d never get random dick pictures that way though.

  • DoucheBagMcSwag@lemmy.dbzer0.com
    link
    fedilink
    arrow-up
    19
    arrow-down
    1
    ·
    2 years ago

    Damn…so this isn’t the fun kernel level access exploit.

    This is the boring, my data could be compromised exploit.

  • Gamey@feddit.rocks
    link
    fedilink
    arrow-up
    12
    ·
    2 years ago

    Fuck, the NSO group managed that shit again?!

  • TheCaconym [any]@hexbear.net
    link
    fedilink
    English
    arrow-up
    26
    arrow-down
    17
    ·
    2 years ago

    lmao, iMessage again ? zero user interaction needed, again ?!

    Well done Apple

    • fartsparkles@sh.itjust.works
      link
      fedilink
      arrow-up
      34
      arrow-down
      2
      ·
      edit-2
      2 years ago

      It’s literally been 3 days since Android had a vulnerability of this exact nature: remote code execution with zero user interaction required (CVE-2023-35674).

      Every piece of software has vulnerabilities lurking within. What matters is the velocity at which vendors address and resolve those vulnerabilities. Apple and Google are both exemplary at getting patches out quickly.

      • sik0fewl@kbin.social
        link
        fedilink
        arrow-up
        16
        arrow-down
        1
        ·
        2 years ago

        Stop bringing up old news. We’re hating on Apple today!

        • fartsparkles@sh.itjust.works
          link
          fedilink
          arrow-up
          2
          ·
          2 years ago

          Oops! I forgot to check the schedule.

      • planish@sh.itjust.works
        link
        fedilink
        arrow-up
        2
        arrow-down
        2
        ·
        2 years ago

        Every piece of software has vulnerabilities lurking within.

        Remind me why we put up with this again? Formal verification does exist.

        • fartsparkles@sh.itjust.works
          link
          fedilink
          arrow-up
          3
          ·
          2 years ago

          Formal Verification doesn’t guarantee that the code is free of vulnerability, it just increases confidence in its security. It’s never perfect.

    • nicman24@kbin.social
      link
      fedilink
      arrow-up
      6
      ·
      2 years ago

      butbutbut… blue box

  • /home/pineapplelover@lemm.ee
    link
    fedilink
    arrow-up
    7
    ·
    edit-2
    2 years ago

    Article missing, here is the archive link. https://web.archive.org/web/20230908134811/https://citizenlab.ca/2023/09/blastpass-nso-group-iphone-zero-click-zero-day-exploit-captured-in-the-wild/

    Edit: able to access now but I’ll leave it here just in case.

  • hollyberries@lemmy.blahaj.zone
    link
    fedilink
    English
    arrow-up
    6
    arrow-down
    1
    ·
    2 years ago

    It looks like I need to make some space for an update -.-

  • Cwilliams@beehaw.org
    link
    fedilink
    arrow-up
    3
    ·
    2 years ago

    I just relistened to Dark Net Diaries episode about this! (episode 100, titled NSO) Highly Recommend

  • Azzy@beehaw.org
    link
    fedilink
    arrow-up
    3
    ·
    2 years ago

    Is this fixed if using the iOS 17 Beta?

    • kryllic@programming.dev
      link
      fedilink
      arrow-up
      1
      ·
      2 years ago

      I’d assume in the next public/developer preview, yeah

  • darcy@sh.itjust.works
    link
    fedilink
    arrow-up
    4
    arrow-down
    2
    ·
    2 years ago

    ios “the more secure choice” try not to have a 0-day exploit challenge

  • xXthrowawayXx [none/use name]@hexbear.net
    link
    fedilink
    English
    arrow-up
    2
    ·
    2 years ago

    Lockdown mode stops it.

Privacy@lemmy.ml

privacy@lemmy.ml

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: [email protected]

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

  • Posting a link to a website containing tracking isn’t great, if contents of the website are behind a paywall maybe copy them into the post
  • Don’t promote proprietary software
  • Try to keep things on topic
  • If you have a question, please try searching for previous discussions, maybe it has already been answered
  • Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
  • Be nice :)

Related communities

  • Lemmy.ml libre_culture
  • Lemmy.ml privatelife
  • Lemmy.ml DeGoogle
  • Lemmy.ca privacy

much thanks to @gary_host_laptop for the logo design :)

Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 492 users / day
  • 2.66K users / week
  • 7.11K users / month
  • 16.6K users / 6 months
  • 1 local subscriber
  • 38K subscribers
  • 3.39K Posts
  • 90.8K Comments
  • Modlog
  • mods:
  • k_o_t@lemmy.ml
  • tmpod@lemmy.pt
  • Yayannick@lemmy.ml
  • ranok@sopuli.xyz
  • BE: 0.19.11
  • Modlog
  • Instances
  • Docs
  • Code
  • join-lemmy.org