Single fake image slip revealed entire NSO iPhone spyware scandal

iPhone X passcode screen
iPhone X passcode screen (Image credit: iMore)

What you need to know

  • A new story has revealed how the NSO Pegasus iPhone spyware scandal was uncovered.
  • Sources reveal that a single fake image file was left accidentally on the phone of an activist.
  • It helped to create a hacking blueprint that saw thousands of state-backed hacking victims alerted to surveillance.

A new report into the NSO Pegasus spyware scandal this week has revealed the whole operation was uncovered because of a single fake image file that was accidentally left on the phone of an activist.

From Reuters:

A single activist helped turn the tide against NSO Group, one of the world's most sophisticated spyware companies now facing a cascade of legal action and scrutiny in Washington over damaging new allegations that its software was used to hack government officials and dissidents around the world.It all started with a software glitch on her iPhone.

According to the report, Saudi activist Loujain al-Hathloul received an email from Google alerting her to an attempt to gain access to her Gmail account by state-sponsored hackers. In response, she gave her iPhone to the Canadian privacy group Citizen Lab, who scoured it for six months to try and find any other evidence of unwanted surveillance. This led to the discovery of a single fake image file accidentally left behind by surveillance malware that confirmed NSO was behind the spyware:

After six months of digging through her iPhone records, Citizen Lab researcher Bill Marczak made what he described as an unprecedented discovery: a malfunction in the surveillance software implanted on her phone had left a copy of the malicious image file, rather than deleting itself, after stealing the messages of its target.

Marczak said the find was "a game changer", and the report goes on to say its discovery "led to a hacking blueprint and led Apple Inc to notify thousands of other state-backed hacking victims around the world." In more detail:

The Citizen Lab discovery provided solid evidence the cyberweapon was built by NSO, said Marczak, whose analysis was confirmed by researchers from Amnesty International and Apple, according to three people with direct knowledge of the situation.The spyware found on al-Hathloul's device contained code that showed it was communicating with servers Citizen Lab previously identified as controlled by NSO, Marczak said. Citizen Lab named this new iPhone hacking method "ForcedEntry." The researchers then provided the sample to Apple last September.

This blueprint meant Apple could not only fix the vulnerability but also alert thousands of iPhone users they had been targeted by state-sponsored attacks. Apple sued NSO in November in the U.S. over the incident. NSO group told Reuters in a statement that some organizations making the claims were political opponents of cyber intelligence and that some of the claims were "contractually and technologically impossible."

You can read the full report here.

Stephen Warwick
News Editor

Stephen Warwick has written about Apple for five years at iMore and previously elsewhere. He covers all of iMore's latest breaking news regarding all of Apple's products and services, both hardware and software. Stephen has interviewed industry experts in a range of fields including finance, litigation, security, and more. He also specializes in curating and reviewing audio hardware and has experience beyond journalism in sound engineering, production, and design. Before becoming a writer Stephen studied Ancient History at University and also worked at Apple for more than two years. Stephen is also a host on the iMore show, a weekly podcast recorded live that discusses the latest in breaking Apple news, as well as featuring fun trivia about all things Apple. Follow him on Twitter @stephenwarwick9