{"id":171618,"date":"2023-09-09T00:22:44","date_gmt":"2023-09-09T05:22:44","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2023\/09\/apple-zero-click-imessage-exploit-used-to-infect-iphones-with-spyware"},"modified":"2023-09-09T00:22:44","modified_gmt":"2023-09-09T05:22:44","slug":"apple-zero-click-imessage-exploit-used-to-infect-iphones-with-spyware","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2023\/09\/apple-zero-click-imessage-exploit-used-to-infect-iphones-with-spyware","title":{"rendered":"Apple zero-click iMessage exploit used to infect iPhones with spyware"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/apple-zero-click-imessage-exploit-used-to-infect-iphones-with-spyware2.jpg\"><\/a><\/p>\n<p>Citizen Lab says two zero-days fixed by Apple today in emergency security updates were actively abused as part of a zero-click exploit chain (dubbed BLASTPASS) to deploy NSO Group\u2019s Pegasus commercial spyware onto fully patched iPhones.<\/p>\n<p>The two bugs, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/apple\/apple-discloses-2-new-zero-days-exploited-to-attack-iphones-macs\/\" target=\"_blank\">tracked as CVE-2023\u201341064 and CVE-2023\u201341061<\/a>, allowed the attackers to infect a fully-patched iPhone running iOS 16.6 and belonging to a Washington DC-based civil society organization via PassKit attachments containing malicious images.<\/p>\n<p>\u201cWe refer to the exploit chain as <strong>BLASTPASS<\/strong>. The exploit chain was capable of compromising iPhones running the latest version of iOS (16.6) without any interaction from the victim,\u201d Citizen Lab <a href=\"https:\/\/citizenlab.ca\/2023\/09\/blastpass-nso-group-iphone-zero-click-zero-day-exploit-captured-in-the-wild\/\" target=\"_blank\" rel=\"nofollow noopener\">said<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Citizen Lab says two zero-days fixed by Apple today in emergency security updates were actively abused as part of a zero-click exploit chain (dubbed BLASTPASS) to deploy NSO Group\u2019s Pegasus commercial spyware onto fully patched iPhones. The two bugs, tracked as CVE-2023\u201341064 and CVE-2023\u201341061, allowed the attackers to infect a fully-patched iPhone running iOS 16.6 [\u2026]<\/p>\n","protected":false},"author":534,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1512,1492],"tags":[],"class_list":["post-171618","post","type-post","status-publish","format-standard","hentry","category-mobile-phones","category-security"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/171618","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/534"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=171618"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/171618\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=171618"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=171618"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=171618"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}