iMessage flaw saw journalist’s iPhones hacked in state-sponsored attack<div class="feat-image">
</div>
<p>A suspected state-sponsored attack saw dozens of <a href="
https://9to5mac.com/guides/iphone/" target="_blank" rel="noreferrer noopener">iPhones[/url] hacked by exploiting an <a href="
https://9to5mac.com/guides/imessage/" target="_blank" rel="noreferrer noopener">iMessage[/url] vulnerability that remained unpatched for around a year. The attack was a so-called zero-click one because it didn’t require the victims to take any action: the hack was enabled simply by receiving a text message.</p>
<p>The victims of the attack were
Al Jazeera journalists, and is believed to have been carried out on behalf of Saudi Arabia and the United Arab Emirates governments, using spyware developed by Israeli company NSO Group. It is suspected that these journalists are a ‘minuscule’ fraction of the iPhones hacked using this method …</p>
<p> <a href="
https://9to5mac.com/2020/12/21/iphones-hacked-imessage-flaw/#more-686748" class="more-link">more…[/url]</p>
<p>The post <a rel="nofollow" href="
https://9to5mac.com/2020/12/21/iphones-hacked-imessage-flaw/">iMessage flaw saw journalist’s iPhones hacked in state-sponsored attack[/url] appeared first on <a rel="nofollow" href="
https://9to5mac.com">9to5Mac[/url].</p><div class="feedflare">
<img src="[url]http://feeds.feedburner.com/~ff/9To5Mac-MacAllDay?i=w17q9OcE46E:gANwuQCB7YA:D7DqB2pKExk" border="0"></img>[/url]
</div><img src="
http://feeds.feedburner.com/~r/9To5Mac-MacAllDay/~4/w17q9OcE46E" height="1" width="1" alt=""/>
Source:
iMessage flaw saw journalist’s iPhones hacked in state-sponsored attack