The CVE-2021-30860 defect was reported by The Citizen Lab Discovered last month The most serious iOS flaw that allows an iPhone to be compromised without user intervention (“zero click”) by messages. This vulnerability called FORCEDENTRY, especially used by the NSO Group, is (badly) creating the Pegasus cookie we heard so much about this summer.
Pegasus Spy Malware is still very effective and used
The Canadian laboratory reported a defect to Apple on September 7, which provided the code CVE-2021-30860. The manufacturer explains that the vulnerable operating system involves processing the malicious PDF, which can lead to the implementation of arbitrary code.
According to Citizen Lab, FORCEDENTRY is Exploited At least since February 2021. In March, the team tested the Saudi activist’s phone and determined that it was infected with Pegasus using the method described by Apple (in this case, the malicious files actually hid a PDF file of GIFs).
Last month, Apple pointed out that iOS 15 would further strengthen iOS’s protection against these vulnerabilities, which would bypass the Plaster. Security introduced with iOS 14.
iOS 15: In the news, extra protection against Pegasus malware
Update 0h30 – In a report shared with US newspapers, Apple confirms that the update fixes the iMessage vulnerability announced by Citizen Lab. The builder takes his usual verse in the Pegasus, according to which this type of attacks ” Sophisticated, they cost millions of dollars to build, often have a short lifespan, and are used to target specific individuals .
All of this does not preclude Apple from doing its job properly: ” Although these attacks do not affect the majority of our users, we continue to work tirelessly to protect all of our customers, and we continue to add new security features to their devices and data. .
“Avid writer. Subtly charming alcohol fanatic. Total twitter junkie. Coffee enthusiast. Proud gamer. Web aficionado. Music advocate. Zombie lover. Reader.”