FORCEDENTRY: NSO Group iMessage Zero-Click Exploit Captured in the Wild

dc.contributor.authorMarczak, Bill
dc.contributor.authorScott-Railton, John
dc.contributor.authorAbdul Razzak, Bahr
dc.contributor.authorAl-Jizawi, Noura
dc.contributor.authorAnstis, Siena
dc.contributor.authorBerdan, Kristin
dc.contributor.authorDeibert, Ron
dc.date.accessioned2022-07-28T21:20:22Z
dc.date.available2022-07-28T21:20:22Z
dc.date.issued2021-09-13
dc.description.abstractWhile analyzing the phone of a Saudi activist infected with NSO Group’s Pegasus spyware, we discovered a zero-day zero-click exploit against iMessage. The exploit, which we call FORCEDENTRY, targets Apple’s image rendering library, and was effective against Apple iOS, MacOS and WatchOS devices.en_US
dc.identifier.citationBill Marczak, John Scott-Railton, Bahr Abdul Razzak, Noura Al-Jizawi, Siena Anstis, Kristin Berdan, and Ron Deibert. “FORCEDENTRY: NSO Group iMessage Zero-Click Exploit Captured in the Wild,” Citizen Lab Research Report No. 143, University of Toronto, September 2021.en_US
dc.identifier.urihttp://hdl.handle.net/1807/123970
dc.language.isoen_caen_US
dc.rightsAttribution-ShareAlike 4.0 International*
dc.rights.urihttp://creativecommons.org/licenses/by-sa/4.0/*
dc.subjectspywareen_US
dc.subjectNSO Groupen_US
dc.subjectspyware vendoren_US
dc.subjectPegasusen_US
dc.subjectAppleen_US
dc.subjectiOSen_US
dc.subjectmobileen_US
dc.subjectzero-day exploiten_US
dc.titleFORCEDENTRY: NSO Group iMessage Zero-Click Exploit Captured in the Wilden_US
dc.typeTechnical Reporten_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Report#143--forcedentry.pdf
Size:
1.13 MB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.68 KB
Format:
Item-specific license agreed upon to submission
Description:

Collections