FORCEDENTRY: NSO Group iMessage Zero-Click Exploit Captured in the Wild

Abstract

While analyzing the phone of a Saudi activist infected with NSO Group’s Pegasus spyware, we discovered a zero-day zero-click exploit against iMessage. The exploit, which we call FORCEDENTRY, targets Apple’s image rendering library, and was effective against Apple iOS, MacOS and WatchOS devices.

Description

Keywords

spyware, NSO Group, spyware vendor, Pegasus, Apple, iOS, mobile, zero-day exploit

Citation

Bill Marczak, John Scott-Railton, Bahr Abdul Razzak, Noura Al-Jizawi, Siena Anstis, Kristin Berdan, and Ron Deibert. “FORCEDENTRY: NSO Group iMessage Zero-Click Exploit Captured in the Wild,” Citizen Lab Research Report No. 143, University of Toronto, September 2021.

DOI

ISSN

Creative Commons

Attribution-ShareAlike 4.0 International

Collections

Items in TSpace are protected by copyright, with all rights reserved, unless otherwise indicated.