FORCEDENTRY: NSO Group iMessage Zero-Click Exploit Captured in the Wild
dc.contributor.author | Marczak, Bill | |
dc.contributor.author | Scott-Railton, John | |
dc.contributor.author | Abdul Razzak, Bahr | |
dc.contributor.author | Al-Jizawi, Noura | |
dc.contributor.author | Anstis, Siena | |
dc.contributor.author | Berdan, Kristin | |
dc.contributor.author | Deibert, Ron | |
dc.date.accessioned | 2022-07-28T21:20:22Z | |
dc.date.available | 2022-07-28T21:20:22Z | |
dc.date.issued | 2021-09-13 | |
dc.description.abstract | While analyzing the phone of a Saudi activist infected with NSO Group’s Pegasus spyware, we discovered a zero-day zero-click exploit against iMessage. The exploit, which we call FORCEDENTRY, targets Apple’s image rendering library, and was effective against Apple iOS, MacOS and WatchOS devices. | en_US |
dc.identifier.citation | Bill Marczak, John Scott-Railton, Bahr Abdul Razzak, Noura Al-Jizawi, Siena Anstis, Kristin Berdan, and Ron Deibert. “FORCEDENTRY: NSO Group iMessage Zero-Click Exploit Captured in the Wild,” Citizen Lab Research Report No. 143, University of Toronto, September 2021. | en_US |
dc.identifier.uri | http://hdl.handle.net/1807/123970 | |
dc.language.iso | en_ca | en_US |
dc.rights | Attribution-ShareAlike 4.0 International | * |
dc.rights.uri | http://creativecommons.org/licenses/by-sa/4.0/ | * |
dc.subject | spyware | en_US |
dc.subject | NSO Group | en_US |
dc.subject | spyware vendor | en_US |
dc.subject | Pegasus | en_US |
dc.subject | Apple | en_US |
dc.subject | iOS | en_US |
dc.subject | mobile | en_US |
dc.subject | zero-day exploit | en_US |
dc.title | FORCEDENTRY: NSO Group iMessage Zero-Click Exploit Captured in the Wild | en_US |
dc.type | Technical Report | en_US |