Pegasus is a spyware that is sold only to governments to help with criminal investigations, but there are concerns that it could be used for malicious purposes by other actors. The software can exploit a vulnerability in the iMessage app to infect the target device with a zero-click attack, meaning that the user does not need to click on any link or attachment to be compromised. Once infected, Pegasus can access the device's microphone, camera, location, contacts, messages, emails, and other sensitive data.
But Pegasus does not stop at the device level. It can also clone authentication tokens that iPhones use to access iCloud and then load files from the cloud storage, bypassing any two-factor verification. This means that Pegasus can access not only photos, videos, and messages stored in iCloud, but also backups created by other apps, such as Facebook and WhatsApp. These backups may contain additional information that is not available on the device itself, such as deleted messages or chat history.
Apple has played down the hacking solution, saying that it affects only a small number of devices and that it is constantly updating its software to protect its users. However, security experts have warned that Pegasus is a sophisticated and powerful tool that poses a serious threat to human rights and privacy. They have urged Apple to fix the iMessage vulnerability as soon as possible and to provide more transparency and accountability for its users.
Pegasus is not the only hacking tool that can target iPhones. A recent demonstration by a security researcher showed how a device called Flipper Zero can spam nearby iPhones with annoying pop-ups prompting them to connect to a nearby AirTag, Apple TV, AirPods and other Apple devices. The device can perform wireless attacks on devices in its range using Bluetooth Low Energy protocol. The researcher called it "a Bluetooth advertising assault" that can disrupt the seamless experience that Apple users are accustomed to.
These examples show that Apple devices are not invulnerable to hacking attacks and that users should be aware of the potential risks and take precautions to protect their data. Some of the recommended steps include updating the device's software regularly, enabling two-factor authentication for iCloud and other accounts, disabling Bluetooth when not in use, and avoiding clicking on suspicious links or attachments .
524038ac18