What you need to know
- A new story has revealed how the NSO Pegasus iPhone spyware scandal was uncovered.
- Sources reveal that a single fake image file was left accidentally on the phone of an activist.
- It helped to create a hacking blueprint that saw thousands of state-backed hacking victims alerted to surveillance.
A new report into the NSO Pegasus spyware scandal this week has revealed the whole operation was uncovered because of a single fake image file that was accidentally left on the phone of an activist.
According to the report, Saudi activist Loujain al-Hathloul received an email from Google alerting her to an attempt to gain access to her Gmail account by state-sponsored hackers. In response, she gave her iPhone to the Canadian privacy group Citizen Lab, who scoured it for six months to try and find any other evidence of unwanted surveillance. This led to the discovery of a single fake image file accidentally left behind by surveillance malware that confirmed NSO was behind the spyware:
Marczak said the find was "a game changer", and the report goes on to say its discovery "led to a hacking blueprint and led Apple Inc to notify thousands of other state-backed hacking victims around the world." In more detail:
This blueprint meant Apple could not only fix the vulnerability but also alert thousands of iPhone users they had been targeted by state-sponsored attacks. Apple sued NSO in November in the U.S. over the incident. NSO group told Reuters in a statement that some organizations making the claims were political opponents of cyber intelligence and that some of the claims were "contractually and technologically impossible."
You can read the full report here.
Master your iPhone in minutes
iMore offers spot-on advice and guidance from our team of experts, with decades of Apple device experience to lean on. Learn more with iMore!
Stephen Warwick has written about Apple for five years at iMore and previously elsewhere. He covers all of iMore's latest breaking news regarding all of Apple's products and services, both hardware and software. Stephen has interviewed industry experts in a range of fields including finance, litigation, security, and more. He also specializes in curating and reviewing audio hardware and has experience beyond journalism in sound engineering, production, and design.
Before becoming a writer Stephen studied Ancient History at University and also worked at Apple for more than two years. Stephen is also a host on the iMore show, a weekly podcast recorded live that discusses the latest in breaking Apple news, as well as featuring fun trivia about all things Apple. Follow him on Twitter @stephenwarwick9