Apple releases security patch after iPhone zero day exploit used on UAE political dissident

Ahmed Mansoor is an internationally recognized human rights defender, based in the United Arab Emirates (UAE), and recipient of the Martin Ennals Award (sometimes referred to as a ^aEURoeNobel Prize for human rights^aEUR). On August 10 and 11, 2016, Mansoor received SMS text messages on his iPhone promising ^aEURoenew secrets^aEUR about detainees tortured in UAE jails if he clicked on an included link. Instead of clicking, Mansoor sent the messages to Citizen Lab researchers. We recognized the links as belonging to an exploit infrastructure connected to NSO Group, an Israel-based ^aEURoecyber war^aEUR company that sells Pegasus, a government-exclusive ^aEURoelawful intercept^aEUR spyware product. NSO Group is reportedly owned by an American venture capital firm, Francisco Partners Management.

The ensuing investigation, a collaboration between researchers from Citizen Lab and from Lookout Security, determined that the links led to a chain of zero-day exploits (^aEURoezero-days^aEUR) that would have remotely jailbroken Mansoor’s stock iPhone 6 and installed sophisticated spyware. We are calling this exploit chain Trident. Once infected, Mansoor’s phone would have become a digital spy in his pocket, capable of employing his iPhone’s camera and microphone to snoop on activity in the vicinity of the device, recording his WhatsApp and Viber calls, logging messages sent in mobile chat apps, and tracking his movements.

6 Comments

  1. 2016-08-26 3:29 pm
  2. 2016-08-26 3:59 pm
  3. 2016-08-26 4:18 pm
    • 2016-08-26 5:24 pm
  4. 2016-08-26 4:22 pm
  5. 2016-08-28 1:15 pm