igforum.bio / a-second-surveillance-firm-was-caught-hacking-iphones - 103213
J
%Start A Second Surveillance Firm Was Caught Hacking iPhones GA
S
REGULAR Menu Lifewire Tech for Humans Newsletter! Search Close GO News &gt; Phones <h1>
A Second Surveillance Firm Was Caught Hacking iPhones</h1>
<h2>
Like NSO Group, QuaDream was installing spyware using zero-click vulnerability</h2> By Rob Rich Rob Rich News Reporter College for Creative Studies Rob is a freelance tech reporter with experience writing for a variety of outlets, including IGN, Unwinnable, 148Apps, Gamezebo, Pocket Gamer, Fanbolt, Zam, and more. lifewire's editorial guidelines Published on February 3, 2022 11:51AM EST Fact checked by Jerri Ledford Fact checked by
Jerri Ledford Western Kentucky University Gulf Coast Community College Jerri L.
%Start A Second Surveillance Firm Was Caught Hacking iPhones GA S REGULAR Menu Lifewire Tech for Humans Newsletter! Search Close GO News > Phones

A Second Surveillance Firm Was Caught Hacking iPhones

Like NSO Group, QuaDream was installing spyware using zero-click vulnerability

By Rob Rich Rob Rich News Reporter College for Creative Studies Rob is a freelance tech reporter with experience writing for a variety of outlets, including IGN, Unwinnable, 148Apps, Gamezebo, Pocket Gamer, Fanbolt, Zam, and more. lifewire's editorial guidelines Published on February 3, 2022 11:51AM EST Fact checked by Jerri Ledford Fact checked by Jerri Ledford Western Kentucky University Gulf Coast Community College Jerri L.
thumb_up Like (10)
comment Reply (0)
share Share
visibility 275 views
thumb_up 10 likes
A
Ledford has been writing, editing, and fact-checking tech stories since 1994. Her work has appeared in Computerworld, PC Magazine, Information Today, and many others. lifewire's fact checking process Tweet Share Email Tweet Share Email Phones Mobile Phones Internet & Security Computers & Tablets Smart Life Home Theater & Entertainment Software & Apps Social Media Streaming Gaming In addition to NSO Group, a second surveillance firm was found to have been using the iPhone&#39;s zero-click exploit to spy on users.
Ledford has been writing, editing, and fact-checking tech stories since 1994. Her work has appeared in Computerworld, PC Magazine, Information Today, and many others. lifewire's fact checking process Tweet Share Email Tweet Share Email Phones Mobile Phones Internet & Security Computers & Tablets Smart Life Home Theater & Entertainment Software & Apps Social Media Streaming Gaming In addition to NSO Group, a second surveillance firm was found to have been using the iPhone's zero-click exploit to spy on users.
thumb_up Like (10)
comment Reply (0)
thumb_up 10 likes
H
According to Reuters, the QuaDream firm was similarly using the zero-click exploit to spy on its targets without the need to trick them into downloading or clicking on anything. Sources allege that QuaDream began using this ForcedEntry exploit in iMessage that was first discovered in September 2021. Apple was quick to patch the exploit within that same month.
According to Reuters, the QuaDream firm was similarly using the zero-click exploit to spy on its targets without the need to trick them into downloading or clicking on anything. Sources allege that QuaDream began using this ForcedEntry exploit in iMessage that was first discovered in September 2021. Apple was quick to patch the exploit within that same month.
thumb_up Like (19)
comment Reply (2)
thumb_up 19 likes
comment 2 replies
H
Harper Kim 10 minutes ago
Jeffrey Coolidge / Getty Images QuaDream's flagship spyware, dubbed REIGN, worked much like NSO ...
W
William Brown 4 minutes ago
QuaDream is suspected of using the same exploit as NSO Group because, according to sources, both spy...
D
Jeffrey Coolidge / Getty Images QuaDream&#39;s flagship spyware, dubbed REIGN, worked much like NSO Group&#39;s Pegasus spyware by installing itself on target devices without warning or need for user interaction. Once in place, it began gathering contact info, emails, messages from various messaging apps, and photos. According to a brochure acquired by Reuters, REIGN also offered call recording and camera/microphone activation.
Jeffrey Coolidge / Getty Images QuaDream's flagship spyware, dubbed REIGN, worked much like NSO Group's Pegasus spyware by installing itself on target devices without warning or need for user interaction. Once in place, it began gathering contact info, emails, messages from various messaging apps, and photos. According to a brochure acquired by Reuters, REIGN also offered call recording and camera/microphone activation.
thumb_up Like (22)
comment Reply (0)
thumb_up 22 likes
J
QuaDream is suspected of using the same exploit as NSO Group because, according to sources, both spyware programs took advantage of similar vulnerabilities. They both also used a similar approach to installing malicious software, and Apple&#39;s patch managed to stop both of them in their tracks.
QuaDream is suspected of using the same exploit as NSO Group because, according to sources, both spyware programs took advantage of similar vulnerabilities. They both also used a similar approach to installing malicious software, and Apple's patch managed to stop both of them in their tracks.
thumb_up Like (36)
comment Reply (2)
thumb_up 36 likes
comment 2 replies
J
Jack Thompson 4 minutes ago
While the zero-click vulnerability in iMessage has been addressed, effectively cutting off both Pega...
E
Elijah Patel 8 minutes ago
Thanks for letting us know! Get the Latest Tech News Delivered Every Day Subscribe Tell us why! Othe...
S
While the zero-click vulnerability in iMessage has been addressed, effectively cutting off both Pegasus and REIGN, it&#39;s not a permanent solution. As Reuters points out, smartphones are not (and will probably never be) completely secure from every conceivable form of attack. Was this page helpful?
While the zero-click vulnerability in iMessage has been addressed, effectively cutting off both Pegasus and REIGN, it's not a permanent solution. As Reuters points out, smartphones are not (and will probably never be) completely secure from every conceivable form of attack. Was this page helpful?
thumb_up Like (24)
comment Reply (2)
thumb_up 24 likes
comment 2 replies
L
Luna Park 1 minutes ago
Thanks for letting us know! Get the Latest Tech News Delivered Every Day Subscribe Tell us why! Othe...
I
Isaac Schmidt 1 minutes ago
Plus, How to Protect Yourself Against It Does Windows 10 Need Antivirus Protection? 12 Best Free Spy...
S
Thanks for letting us know! Get the Latest Tech News Delivered Every Day
Subscribe Tell us why! Other Not enough details Hard to understand Submit More from Lifewire What Is Spyware?
Thanks for letting us know! Get the Latest Tech News Delivered Every Day Subscribe Tell us why! Other Not enough details Hard to understand Submit More from Lifewire What Is Spyware?
thumb_up Like (37)
comment Reply (1)
thumb_up 37 likes
comment 1 replies
O
Oliver Taylor 23 minutes ago
Plus, How to Protect Yourself Against It Does Windows 10 Need Antivirus Protection? 12 Best Free Spy...
S
Plus, How to Protect Yourself Against It Does Windows 10 Need Antivirus Protection? 12 Best Free Spyware Removal Tools (October 2022) Browser Hijackers: What They Are and How to Protect Yourself From Them 7 Ways to Tell If Your Phone Is Being Tapped How to Install a Second SSD How to Secure Your Webcam in One Minute or Less 9 Best Ways to Hide Your Identity Online The 6 Best Free Malware Removal Tools of 2022 How Does Spyware Get Onto Your Computer or Phone? What to Do on iPhone to Stop Government Spying What Are Packet Sniffers and How Do They Work?
Plus, How to Protect Yourself Against It Does Windows 10 Need Antivirus Protection? 12 Best Free Spyware Removal Tools (October 2022) Browser Hijackers: What They Are and How to Protect Yourself From Them 7 Ways to Tell If Your Phone Is Being Tapped How to Install a Second SSD How to Secure Your Webcam in One Minute or Less 9 Best Ways to Hide Your Identity Online The 6 Best Free Malware Removal Tools of 2022 How Does Spyware Get Onto Your Computer or Phone? What to Do on iPhone to Stop Government Spying What Are Packet Sniffers and How Do They Work?
thumb_up Like (47)
comment Reply (2)
thumb_up 47 likes
comment 2 replies
A
Aria Nguyen 15 minutes ago
5 Best Spy Camera Apps for 2022 How to Secure Your IP Security Cameras 5 MacBook Security Tips - Int...
E
Evelyn Zhang 6 minutes ago
Cookies Settings Accept All Cookies...
O
5 Best Spy Camera Apps for 2022 How to Secure Your IP Security Cameras 5 MacBook Security Tips - Internet / Network Security What Is a Network Sniffer? Newsletter Sign Up Newsletter Sign Up Newsletter Sign Up Newsletter Sign Up Newsletter Sign Up By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts.
5 Best Spy Camera Apps for 2022 How to Secure Your IP Security Cameras 5 MacBook Security Tips - Internet / Network Security What Is a Network Sniffer? Newsletter Sign Up Newsletter Sign Up Newsletter Sign Up Newsletter Sign Up Newsletter Sign Up By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts.
thumb_up Like (42)
comment Reply (2)
thumb_up 42 likes
comment 2 replies
A
Ava White 7 minutes ago
Cookies Settings Accept All Cookies...
M
Mason Rodriguez 11 minutes ago
A Second Surveillance Firm Was Caught Hacking iPhones GA S REGULAR Menu Lifewire Tech for Humans New...
A
Cookies Settings Accept All Cookies
Cookies Settings Accept All Cookies
thumb_up Like (43)
comment Reply (3)
thumb_up 43 likes
comment 3 replies
E
Emma Wilson 1 minutes ago
A Second Surveillance Firm Was Caught Hacking iPhones GA S REGULAR Menu Lifewire Tech for Humans New...
D
Dylan Patel 10 minutes ago
Ledford has been writing, editing, and fact-checking tech stories since 1994. Her work has appeared ...

Write a Reply