FORCEDENTRY: NSO Group iMessage Zero-Click Exploit Captured in the Wild
Date
2021-09-13
Journal Title
Journal ISSN
Volume Title
Publisher
Abstract
While analyzing the phone of a Saudi activist infected with NSO Group’s Pegasus spyware, we discovered a zero-day zero-click exploit against iMessage. The exploit, which we call FORCEDENTRY, targets Apple’s image rendering library, and was effective against Apple iOS, MacOS and WatchOS devices.
Description
Keywords
spyware, NSO Group, spyware vendor, Pegasus, Apple, iOS, mobile, zero-day exploit
Citation
Bill Marczak, John Scott-Railton, Bahr Abdul Razzak, Noura Al-Jizawi, Siena Anstis,
Kristin Berdan, and Ron Deibert. “FORCEDENTRY: NSO Group iMessage Zero-Click
Exploit Captured in the Wild,” Citizen Lab Research Report No. 143, University of Toronto,
September 2021.
DOI
ISSN
Creative Commons
Attribution-ShareAlike 4.0 International
Creative Commons URI
Collections
Items in TSpace are protected by copyright, with all rights reserved, unless otherwise indicated.