Apple’s Mercenary spyware alert
April 12, 2024

Why in news?

Apple recently sent out warnings to iPhone users in India and 91 other countries. The company informed users saying that their iPhones might be under attack by a type of spyware called mercenary spyware, including one called Pegasus.

In October 2023, they sent similar warnings to politicians from different parties in India, suggesting a possible state-sponsored spyware attack on their iPhones. However, Apple later said they could not pinpoint any specific attacker.

What’s in today’s article?

  • Spyware and malware
  • Mercenary spyware attack
  • Pegasus

Spyware and malware

  • Spyware and malware are types of harmful software designed to infiltrate and damage computers or devices.
  • Spyware
    • Spyware specifically focuses on spying on a user's activities, such as browsing habits, keystrokes, or personal information, without their consent.
    • It often aims to gather data for advertising purposes or identity theft.
  • Malware
    • Malware, short for malicious software, encompasses a broader range of harmful programs that can include viruses, worms, ransomware, and more.
    • Malware typically aims to disrupt, damage, or gain unauthorized access to a computer system or network.

Mercenary spyware attacks

  • About
    • Mercenary spyware attacks are highly complex, targeting specific individuals with exceptional resources, surpassing regular cybercriminal activity and consumer malware.
    • They are difficult to detect & prevent due to their substantial investment & short lifespan. They have been targeting some users, but most people are probably safe.
    • These attacks represent some of the most sophisticated digital threats globally, prompting Apple to abstain from assigning them to specific attackers or regions.
  • Aim
    • Mercenary spyware is designed to remotely infiltrate and compromise smartphones and other devices without the knowledge or consent of the users.
    • These surveillance tools could be used to monitor movements and communications, steal private data, etc.
    • In some cases, governments, intelligence agencies, and law enforcement bodies have reportedly bought mercenary spyware wherein political opponents and activists are often targeted.
  • Examples
    • Companies producing mercenary spyware include the NSO Group, FinFisher, and Hacking Team.
      • NSO Group's flagship spyware Pegasus helps infiltrate devices remotely and access calls, emails, messages, and other files.
      • Finfisher's products like FinSpy can capture keystrokes and access data besides activating microphones and cameras without permission.
      • The Hacking Team's Galileo aka Remote Control System (RCS) also can capture keystrokes and record video calls besides accessing the camera and microphone.

Pegasus Spyware

  • Pegasus is a malware/spyware developed by Israel’s NSO Group.
  • The spyware suite is designed to access any smartphone through zero-click vulnerabilities
  • Once a phone is infiltrated, the spyware can access entire data on that particular phone.
  • It also has real-time access to emails, texts, phone calls, as well as the camera and sound recording capabilities of the smartphone.

Zero-click exploit

  • About
    • It refers to malicious installed on a device without the device owner’s consent.
    • More importantly, it does not require the device owner to perform any actions to initiate or complete the installation.
  • Specific exploit used in the present case involving Indian journalists
    • The specific exploit allegedly in use on the two devices is called BLASTPAST (previously identified as BLASTPASS). It plays out in two phases.
    • In the first, the attack attempts to establish a link with the Apple HomeKit - which gives users a way to control multiple smart devices - on the target’s device.
      • The purpose of the first phase could be to determine how the device can be exploited or to keep it in sight for further exploitation in the future.
    • In the second, some malicious content is sent via the iMessage app to the target.
      • This phase is the one that delivers the full spyware payload.