wp-plugin-hostgator
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/scienrds/scienceandnerds/wp-includes/functions.php on line 6114ol-scrapes
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/scienrds/scienceandnerds/wp-includes/functions.php on line 6114Source:https:\/\/techcrunch.com\/2023\/04\/11\/quadream-spyware-hacked-iphones-calendar-invites\/<\/a><\/br> Hackers using spyware<\/span> made by a little known cyber mercenary company used malicious calendar invites to hack the iPhones of journalists, political opposition figures and an NGO worker, according to two reports.<\/p>\n Researchers at Microsoft and the digital rights group Citizen Lab analyzed samples of malware they say was created by QuaDream, an Israeli spyware maker that has been reported<\/a> to develop zero-click exploits \u2014 meaning hacking tools that don\u2019t require the target to click on malicious links \u2014 for iPhones.<\/p>\n QuaDream has been able to mostly fly under the radar until recently. In 2021, Israeli newspaper Haaretz reported that QuaDream sold its wares<\/a> to Saudi Arabia. The next year, Reuters reported that QuaDream sold an exploit to hack iPhones that was similar to one provided by NSO Group, and that the company doesn\u2019t operate<\/a> the spyware, its government customers do \u2014 a common practice in the surveillance tech industry.<\/p>\n QuaDream\u2019s customers operated servers from several countries around the world: Bulgaria, Czech Republic, Hungary, Romania, Ghana, Israel, Mexico, Singapore, United Arab Emirates (UAE) and Uzbekistan, according to internet scans done by Citizen Lab.<\/p>\n Both Citizen Lab<\/a> and Microsoft<\/a> published groundbreaking new technical reports on QuaDream\u2019s alleged spyware on Tuesday.<\/p>\n Microsoft said it found the original malware samples, and then shared them with Citizen Lab\u2019s researchers, who were able to identify more than five victims \u2014 an NGO worker, politicians and journalists \u2014 whose iPhones were hacked. The exploit used to hack those targets was developed for iOS 14, and at the time was unpatched and unknown to Apple, making it a so-called zero-day. The government hackers who were equipped with QuaDream\u2019s exploit used malicious calendar invites with dates in the past to deliver the malware, according to Citizen Lab.<\/p>\n Those invites didn\u2019t trigger a notification on the phone, which made them invisible to the target, Bill Marczak, a senior researcher at Citizen Lab who worked on the report, told TechCrunch.<\/p>\n Apple\u2019s spokesperson Scott Radcliffe said that there\u2019s no evidence showing the exploit discovered by Microsoft and Citizen Lab has been used after March 2021, when the company released an update.<\/p>\n Citizen Lab is not naming the victims because they don\u2019t want to be identified. Marczak said that they are all in different countries, which makes it harder for the victims to come out.<\/p>\n \u201cNobody necessarily wants to be the first one in their community to come out and say, \u2018yes, I was targeted,\u2019\u201d he said, adding that it\u2019s usually easier if the victims are all in the same country and part of the same community or group.<\/p>\n Before Microsoft contacted Citizen Lab, Marczak said he and his colleagues had identified several people targeted by an exploit that was similar to the one used by NSO Group customers in 2021, known as FORCEDENTRY<\/a>. At the time, Marczak and colleagues concluded that those people were targeted with a tool made by another company, not NSO Group.<\/p>\n
\nMercenary spyware hacked iPhone victims with rogue calendar invites, researchers say<\/br>
\n2023-04-11 21:54:00<\/br><\/p>\n