article thumbnail

Pegasus spyware and how it exploited a WebP vulnerability

Malwarebytes

Recent events have demonstrated very clearly just how persistent and wide-spread the Pegasus spyware is. The exploit chain based on these vulnerabilities was capable of compromising devices without any interaction from the victim and were reportedly used by the NSO Group to deliver its infamous Pegasus spyware.

Spyware 129
article thumbnail

Apple Patches Vulnerabilities in iOS Exploited by Spyware

eSecurity Planet

Apple continues to be haunted by spyware developed by an Israeli security firm that hostile governments used to hack into Apple devices to spy on journalists, activists and world leaders (see Apple Security Under Scrutiny Amid Fallout from NSO Spyware Scandal ). Spyware Vulnerability. and iPadOS 14.8

Spyware 117
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Long-running surveillance campaigns target Uyghurs with BadBazaar and MOONSHINE spyware

Security Affairs

The threat actors behind the campaigns used two Android spyware to spy on the victims and steal sensitive information. APT15 has been active since at least 2010, it conducted cyber espionage campaigns against targets worldwide in several industries, including defense, high tech, energy, government, aerospace, and manufacturing.

article thumbnail

The Belgacom hack was the work of the UK GCHQ intelligence agency

Security Affairs

Belgian newspaper reported that investigators had found proof that the Belgacom hack was the work of the UK GCHQ intelligence agency. According to Snowden, the UK’s signals intelligence have hacked into the Belgian telco to spy on private communications in transit into its infrastructure. ” wrote The Intercept.

Hacking 83
article thumbnail

A new variant of Asruex Trojan exploits very old Office, Adobe flaws

Security Affairs

Asruex first appeared in the threat landscape 2015, researchers linked it to the spyware used by the DarkHotel APT group. CVE-2010-2883 is a stack buffer overflow flaw that could be exploited by attackers to execute arbitrary code or trigger a denial of service condition. . ” reads the report published by Trend Micro. .

Malware 83
article thumbnail

Former NSA TAO hacker sentenced to 66 months in prison over Kaspersky Leak

Security Affairs

A former member of the NSA’s Tailored Access Operations hacking team was sentenced to 66 months in prison because he leaked top-secret online documents related to the US government ban on Kaspersky software. The man pleaded guilty in December 2017 to one count of willful retention of classified national defense information.

article thumbnail

Pegasus spyware has been here for years. We must stop ignoring it

Malwarebytes

Pegasus is spyware, and spyware is not made to respect privacy. It enables abuses like the mobile phone hack of Hatice Cengiz , former fiancée of murdered Washington Post columnist Jamal Khoshoggi. The reporters believe the 50,000 phone numbers are a list of phone numbers that have been targeted using Pegasus spyware.

Spyware 120