NewsBite

Start-up manipulated iPhone to allow government spying, report says

An Israeli firm is said to have exploited Apple smartphone flaws to help nations spy on their citizens.

Security researchers say a little-known Israeli start-up exploited previously unknown bugs in Apple’s smartphone software to help foreign governments spy on their citizens.

The researchers say the surveillance software was the work of NSO Group Technologies, which sells primarily to government agencies. The researchers, at Citizen Lab, a group that investigates surveillance technology, and at mobile-security firm Lookout, say they discovered the software in a link sent earlier this month to the phone of Ahmed Mansoor, a human-rights activist in the United Arab Emirates.

Their report sheds new light on the capabilities of private security companies to produce sophisticated software for state-sponsored spying. It also suggests that the iOS operating system behind Apple’s iPhones isn’t as impregnable as it appeared earlier this year, when the Federal Bureau of Investigation struggled for weeks and ultimately paid $1 million to unlock a phone tied to the San Bernardino terror attack.

NSO Group’s software takes advantage of three previously unknown flaws in iOS to install itself on an iPhone, where it then transforms the phone into a surveillance device, tracking its movements, logging messages and downloading personal data.

In a statement Thursday, Apple said it had been “made aware of this vulnerability and immediately fixed it.” The company advised iPhone users to download the new version of iOS, dubbed 9.3.5.

Mike Murray, Lookout’s vice president of security research, said the NSO software, called Pegasus, is “the most professional piece of spyware that I’ve ever seen.” He said the software operates stealthily, ensuring that it doesn’t quickly drain the battery and speeding up its data transfer when it is on Wi-Fi networks so that it doesn’t get noticed.

An NSO spokesman said the company had no knowledge of Mr. Mansoor’s case. In a statement, the spokesman said, “NSO’s mission is to help make the world a safer place, by providing authorised governments with technology that helps them combat terror and crime. The company sells only to authorised governmental agencies, and fully complies with strict export control laws and regulations.”

The spokesman said NSO doesn’t operate its systems, and requires customers to use them lawfully and only “for the prevention and investigation of crimes.”

NSO has billed itself as a leader in the field of cyberwarfare, offering tools for governments to keep tabs on criminals and terrorists who use encrypted communications. The company has been thought to be capable of installing unauthorised software on Android, BlackBerry and iPhone devices, but Thursday’s report provides the first in-depth look at its capabilities.

“We’re a complete ghost,” NSO co-founder Omri Lavie told Defense News in a 2013 interview. “We’re totally transparent to the target, and we leave no traces.”

The Wall Street Journal in 2014 reported that the company had been acquired by private-equity firm Francisco Partners for $110 million. Francisco Partners had no immediate comment.

Researchers highlighted the unusual way that Pegasus is installed on a phone, taking advantage of the three flaws in iOS to silently “jailbreak” the phone and circumvent the requirement that only Apple-approved software runs on the device. This type of one-click iPhone attack previously has been described by researchers but never been seen in a real-world attack, Lookout’s Mr. Murray said.

Mr Mansoor said he received a text message August 10 from a phone number he didn’t recognise that said, “New secrets about torture of Emiratis in state prisons.” He said his suspicions immediately were aroused. “I could tell that there was something wrong and I contacted the Citizen Lab team immediately.”

At Citizen Lab, researchers found that the link in Mr. Mansoor’s text message led to a website that they previously had connected to NSO Group. That website launched the Apple attack and installed the Pegasus spyware.

Although these products typically are marketed as legitimate tools sold only to law enforcement, some governments use them to spy on activists and journalists, said Bill Marczak, a senior researcher with Citizen Lab.

After the attack on Mr. Mansoor, Citizen Lab linked NSO to 2015 attacks on a Mexican journalist who received text messages that were similar to Mr. Mansoor’s.

Mr Mansoor believes that he was the target of UAE officials looking to keep tabs on his online activity.

A UAE official declined to comment.

Write to Robert McMillan at Robert.Mcmillan@wsj.com

Add your comment to this story

To join the conversation, please Don't have an account? Register

Join the conversation, you are commenting as Logout

Original URL: https://www.theaustralian.com.au/business/technology/startup-manipulated-iphone-to-allow-government-spying-report-says/news-story/467c2e1c744d2481c60c1864e87a311e