Google researchers have described NSO Group’s zero-click exploit used to hack Apple devices as “incredible and terrifying,” Wired has reported. Project Zero researchers called it “one of the most technically sophisticated exploits we’ve ever seen” that’s on par with attacks from elite nation-state spies.
The Project Zero team said it obtained one of NSO’s Pegasus exploits from Citizen Lab, which managed to capture it via a targeted Saudi activist. It also worked with Apple’s Security Engineering and Architecture (SEAR) group on the technical analysis.
NSO’s original exploit required the user to click on a link, but the latest, most sophisticated exploits require no click at all. Called ForcedEntry, it takes advantage of the way iMessage interprets files like GIFs to open a malicious PDF file with no action required from the victim. It does so by using old code from the 1990s used to process text in scanner images.
Apple recently filed a lawsuit against the group to “hold it accountable” for governments using it to spy on iOS users. Apple alleged that targets are often activists, journalists and other critics of regimes that routinely suppress political dissent. It also accused NSO of “flagrant violations” of federal- and state-level laws in the US. Last month, the US Department of Commerce added NSO Group to its “entity list”, essentially banning it for use in the US.