LX Pontual
  • Communities
  • Create Post
  • Create Community
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
OsrsNeedsF2P@lemmy.ml to Privacy@lemmy.ml · 2 years ago

0-Day Remote iPhone Full Access Being Abused, Update Immediately

citizenlab.ca

external-link
message-square
12
link
fedilink
  • cross-posted to:
  • [email protected]
  • [email protected]
7
external-link

0-Day Remote iPhone Full Access Being Abused, Update Immediately

citizenlab.ca

OsrsNeedsF2P@lemmy.ml to Privacy@lemmy.ml · 2 years ago
message-square
12
link
fedilink
  • cross-posted to:
  • [email protected]
  • [email protected]
BLASTPASS: NSO Group iPhone Zero-Click, Zero-Day Exploit Captured in the Wild - The Citizen Lab
citizenlab.ca
external-link
Citizen Lab found an actively exploited zero-click vulnerability being used to deliver NSO Group’s Pegasus mercenary spyware while checking the device of an individual employed by a Washington DC-based civil society organization with international offices. We refer to the exploit chain as BLASTPASS. The exploit chain was capable of compromising iPhones running the latest version of iOS (16.6) without any interaction from the victim.
alert-triangle
You must log in or # to comment.
  • DoucheBagMcSwag@lemmy.dbzer0.com
    link
    fedilink
    arrow-up
    3
    ·
    2 years ago

    Damn…so this isn’t the fun kernel level access exploit.

    This is the boring, my data could be compromised exploit.

  • darcy@sh.itjust.works
    link
    fedilink
    arrow-up
    2
    ·
    2 years ago

    ios “the more secure choice” try not to have a 0-day exploit challenge

  • OsrsNeedsF2P@lemmy.mlOP
    link
    fedilink
    arrow-up
    2
    ·
    2 years ago

    Couldn’t think of a better title, TL;DR via receiving an iMessage with a specially crafted image, an attacker can get full access to your device. Update iOS immediately to resolve the issue

    • fartsparkles@sh.itjust.works
      link
      fedilink
      arrow-up
      2
      ·
      2 years ago

      PSA: Android just published a patch for a very similar vulnerability in their September Security release. You should update your Android devices ASAP.

      • 🅵🅴🅳🅴🆁🅰🅻🅰🅻🅸🅴🅽🆂🅼🆄🅶🅶🅻🅴🆁@feddit.de
        link
        fedilink
        English
        arrow-up
        1
        ·
        2 years ago

        Which CVE is that and where can i read a description of how this vulnerability is being used?

        • fartsparkles@sh.itjust.works
          link
          fedilink
          arrow-up
          1
          ·
          2 years ago

          CVE-2023-35674 No real details published yet but Google discussed it in their September security bulletin.

  • TheCaconym [any]@hexbear.net
    link
    fedilink
    English
    arrow-up
    1
    arrow-down
    1
    ·
    2 years ago

    lmao, iMessage again ? zero user interaction needed, again ?!

    Well done Apple

    • fartsparkles@sh.itjust.works
      link
      fedilink
      arrow-up
      3
      ·
      edit-2
      2 years ago

      It’s literally been 3 days since Android had a vulnerability of this exact nature: remote code execution with zero user interaction required (CVE-2023-35674).

      Every piece of software has vulnerabilities lurking within. What matters is the velocity at which vendors address and resolve those vulnerabilities. Apple and Google are both exemplary at getting patches out quickly.

      • sik0fewl@kbin.social
        link
        fedilink
        arrow-up
        1
        ·
        2 years ago

        Stop bringing up old news. We’re hating on Apple today!

        • fartsparkles@sh.itjust.works
          link
          fedilink
          arrow-up
          1
          ·
          2 years ago

          Oops! I forgot to check the schedule.

      • planish@sh.itjust.works
        link
        fedilink
        arrow-up
        0
        ·
        2 years ago

        Every piece of software has vulnerabilities lurking within.

        Remind me why we put up with this again? Formal verification does exist.

        • fartsparkles@sh.itjust.works
          link
          fedilink
          arrow-up
          1
          ·
          2 years ago

          Formal Verification doesn’t guarantee that the code is free of vulnerability, it just increases confidence in its security. It’s never perfect.

Privacy@lemmy.ml

privacy@lemmy.ml

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: [email protected]

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

  • Posting a link to a website containing tracking isn’t great, if contents of the website are behind a paywall maybe copy them into the post
  • Don’t promote proprietary software
  • Try to keep things on topic
  • If you have a question, please try searching for previous discussions, maybe it has already been answered
  • Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
  • Be nice :)

Related communities

  • Lemmy.ml libre_culture
  • Lemmy.ml privatelife
  • Lemmy.ml DeGoogle
  • Lemmy.ca privacy

much thanks to @gary_host_laptop for the logo design :)

Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 1.5K users / day
  • 2.14K users / week
  • 6.05K users / month
  • 17K users / 6 months
  • 1 local subscriber
  • 39.7K subscribers
  • 3.55K Posts
  • 86.6K Comments
  • Modlog
  • mods:
  • k_o_t@lemmy.ml
  • tmpod@lemmy.pt
  • Yayannick@lemmy.ml
  • ranok@sopuli.xyz
  • BE: 0.19.12
  • Modlog
  • Instances
  • Docs
  • Code
  • join-lemmy.org