sh.itjust.works
  • Communities
  • Create Post
  • Create Community
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
OsrsNeedsF2P@lemmy.ml to Privacy@lemmy.ml · 2 years ago

0-Day Remote iPhone Full Access Being Abused, Update Immediately

citizenlab.ca

external-link
message-square
23
link
fedilink
  • cross-posted to:
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
243
external-link

0-Day Remote iPhone Full Access Being Abused, Update Immediately

citizenlab.ca

OsrsNeedsF2P@lemmy.ml to Privacy@lemmy.ml · 2 years ago
message-square
23
link
fedilink
  • cross-posted to:
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
BLASTPASS: NSO Group iPhone Zero-Click, Zero-Day Exploit Captured in the Wild - The Citizen Lab
citizenlab.ca
external-link
Citizen Lab found an actively exploited zero-click vulnerability being used to deliver NSO Group’s Pegasus mercenary spyware while checking the device of an individual employed by a Washington DC-based civil society organization with international offices. We refer to the exploit chain as BLASTPASS. The exploit chain was capable of compromising iPhones running the latest version of iOS (16.6) without any interaction from the victim.
alert-triangle
You must log in or register to comment.
  • OsrsNeedsF2P@lemmy.mlOP
    link
    fedilink
    arrow-up
    71
    ·
    2 years ago

    Couldn’t think of a better title, TL;DR via receiving an iMessage with a specially crafted image, an attacker can get full access to your device. Update iOS immediately to resolve the issue

    • fartsparkles
      link
      fedilink
      arrow-up
      38
      ·
      2 years ago

      PSA: Android just published a patch for a very similar vulnerability in their September Security release. You should update your Android devices ASAP.

      • 🅵🅴🅳🅴🆁🅰🅻🅰🅻🅸🅴🅽🆂🅼🆄🅶🅶🅻🅴🆁@feddit.de
        link
        fedilink
        English
        arrow-up
        14
        ·
        2 years ago

        Which CVE is that and where can i read a description of how this vulnerability is being used?

        • fartsparkles
          link
          fedilink
          arrow-up
          6
          ·
          2 years ago

          CVE-2023-35674 No real details published yet but Google discussed it in their September security bulletin.

    • DocBlaze@lemmy.world
      link
      fedilink
      arrow-up
      4
      arrow-down
      75
      ·
      edit-2
      2 years ago

      deleted by creator

      • El Barto@lemmy.world
        link
        fedilink
        arrow-up
        51
        arrow-down
        1
        ·
        edit-2
        2 years ago

        Get off that high horse.

      • prowess2956@kbin.social
        link
        fedilink
        arrow-up
        20
        ·
        2 years ago

        How do you block MMS from unknown senders on iOS?

        • Drunemeton@lemmy.world
          link
          fedilink
          English
          arrow-up
          6
          ·
          2 years ago

          Settings > Messages > SMS/MMS > MMS Messaging (uncheck)

          And/Or

          Message Filtering > Filter Unknown Senders (checked)

          Those seem to be the likely options, but I’ve zero idea if those will work.

        • DocBlaze@lemmy.world
          link
          fedilink
          arrow-up
          1
          arrow-down
          2
          ·
          edit-2
          2 years ago

          deleted by creator

      • mishimaenjoyer@kbin.social
        link
        fedilink
        arrow-up
        12
        ·
        edit-2
        2 years ago

        at this point most iphone users are very much used to reicive images within imessage and have already forgotten that mms existed or are too young to actually ever had to deal with it, so to them it’s just yet another picture.

        • DocBlaze@lemmy.world
          link
          fedilink
          arrow-up
          1
          arrow-down
          5
          ·
          edit-2
          2 years ago

          deleted by creator

          • Ado@lemmy.world
            link
            fedilink
            arrow-up
            4
            ·
            2 years ago

            lol, even if people went through to change their defaults, why would they expect an image to be able to hijack their device?

            There’s so many automated things on smart phones nowadays, should we disable everything to ensure avoiding future exploits?

            • Dontfearthereaper123@lemm.ee
              link
              fedilink
              arrow-up
              2
              arrow-down
              1
              ·
              2 years ago

              They would expect an image to hijack their device because they’ve been warned about downloading attachments in basically every Internet safety anything. We should disable things like nfc and other security vulnerabilities when not in use, it doesn’t take a genius to figure out which can be dangerous.

      • SatansMaggotyCumFart@lemmy.world
        link
        fedilink
        arrow-up
        6
        arrow-down
        1
        ·
        2 years ago

        I’d never get random dick pictures that way though.

  • DoucheBagMcSwag@lemmy.dbzer0.com
    link
    fedilink
    arrow-up
    18
    arrow-down
    1
    ·
    2 years ago

    Damn…so this isn’t the fun kernel level access exploit.

    This is the boring, my data could be compromised exploit.

  • Gamey@feddit.rocks
    link
    fedilink
    arrow-up
    12
    ·
    2 years ago

    Fuck, the NSO group managed that shit again?!

  • TheCaconym [any]@hexbear.net
    link
    fedilink
    English
    arrow-up
    26
    arrow-down
    17
    ·
    2 years ago

    lmao, iMessage again ? zero user interaction needed, again ?!

    Well done Apple

    • fartsparkles
      link
      fedilink
      arrow-up
      44
      arrow-down
      2
      ·
      edit-2
      2 years ago

      It’s literally been 3 days since Android had a vulnerability of this exact nature: remote code execution with zero user interaction required (CVE-2023-35674).

      Every piece of software has vulnerabilities lurking within. What matters is the velocity at which vendors address and resolve those vulnerabilities. Apple and Google are both exemplary at getting patches out quickly.

      • sik0fewl@kbin.social
        link
        fedilink
        arrow-up
        16
        arrow-down
        1
        ·
        2 years ago

        Stop bringing up old news. We’re hating on Apple today!

        • fartsparkles
          link
          fedilink
          arrow-up
          3
          ·
          2 years ago

          Oops! I forgot to check the schedule.

      • planish
        link
        fedilink
        arrow-up
        2
        arrow-down
        2
        ·
        2 years ago

        Every piece of software has vulnerabilities lurking within.

        Remind me why we put up with this again? Formal verification does exist.

        • fartsparkles
          link
          fedilink
          arrow-up
          3
          ·
          2 years ago

          Formal Verification doesn’t guarantee that the code is free of vulnerability, it just increases confidence in its security. It’s never perfect.

    • nicman24@kbin.social
      link
      fedilink
      arrow-up
      6
      ·
      2 years ago

      butbutbut… blue box

  • /home/pineapplelover@lemm.ee
    link
    fedilink
    arrow-up
    7
    ·
    edit-2
    2 years ago

    Article missing, here is the archive link. https://web.archive.org/web/20230908134811/https://citizenlab.ca/2023/09/blastpass-nso-group-iphone-zero-click-zero-day-exploit-captured-in-the-wild/

    Edit: able to access now but I’ll leave it here just in case.

  • hollyberries@lemmy.blahaj.zone
    link
    fedilink
    English
    arrow-up
    6
    arrow-down
    1
    ·
    edit-2
    1 year ago

    deleted by creator

  • darcy
    link
    fedilink
    arrow-up
    5
    arrow-down
    2
    ·
    2 years ago

    ios “the more secure choice” try not to have a 0-day exploit challenge

  • xXthrowawayXx [none/use name]@hexbear.net
    link
    fedilink
    English
    arrow-up
    2
    ·
    2 years ago

    Lockdown mode stops it.

Privacy@lemmy.ml

privacy@lemmy.ml

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: [email protected]

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

  • Posting a link to a website containing tracking isn’t great, if contents of the website are behind a paywall maybe copy them into the post
  • Don’t promote proprietary software
  • Try to keep things on topic
  • If you have a question, please try searching for previous discussions, maybe it has already been answered
  • Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
  • Be nice :)

Related communities

  • Lemmy.ml libre_culture
  • Lemmy.ml privatelife
  • Lemmy.ml DeGoogle
  • Lemmy.ca privacy

much thanks to @gary_host_laptop for the logo design :)

Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 646 users / day
  • 2.54K users / week
  • 6.72K users / month
  • 15.7K users / 6 months
  • 1.64K local subscribers
  • 38K subscribers
  • 3.52K Posts
  • 89.4K Comments
  • Modlog
  • mods:
  • k_o_t@lemmy.ml
  • tmpod@lemmy.pt
  • Yayannick@lemmy.ml
  • ranok@sopuli.xyz
  • BE: 0.19.11
  • Modlog
  • Legal
  • Instances
  • Docs
  • Code
  • join-lemmy.org