article thumbnail

Pegasus spyware and how it exploited a WebP vulnerability

Malwarebytes

Recent events have demonstrated very clearly just how persistent and wide-spread the Pegasus spyware is. The exploit chain based on these vulnerabilities was capable of compromising devices without any interaction from the victim and were reportedly used by the NSO Group to deliver its infamous Pegasus spyware.

Spyware 133
article thumbnail

Apple Patches Vulnerabilities in iOS Exploited by Spyware

eSecurity Planet

Apple continues to be haunted by spyware developed by an Israeli security firm that hostile governments used to hack into Apple devices to spy on journalists, activists and world leaders (see Apple Security Under Scrutiny Amid Fallout from NSO Spyware Scandal ). operating system was being exploited by the invasive Pegasus spyware.

Spyware 118
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Long-running surveillance campaigns target Uyghurs with BadBazaar and MOONSHINE spyware

Security Affairs

The threat actors behind the campaigns used two Android spyware to spy on the victims and steal sensitive information. APT15 has been active since at least 2010, it conducted cyber espionage campaigns against targets worldwide in several industries, including defense, high tech, energy, government, aerospace, and manufacturing.

article thumbnail

A new variant of Asruex Trojan exploits very old Office, Adobe flaws

Security Affairs

Asruex first appeared in the threat landscape 2015, researchers linked it to the spyware used by the DarkHotel APT group. CVE-2010-2883 is a stack buffer overflow flaw that could be exploited by attackers to execute arbitrary code or trigger a denial of service condition. . ” reads the report published by Trend Micro. .

Malware 83
article thumbnail

OnionPoison: infected Tor Browser installer distributed through popular YouTube channel

SecureList

More importantly, one of the libraries bundled with the malicious Tor Browser is infected with spyware that collects various personal data and sends it to a command and control server. The spyware also provides the functionality to execute shell commands on the victim machine, giving the attacker control over it. 2021-Dec-21 09:44:08.

article thumbnail

The Belgacom hack was the work of the UK GCHQ intelligence agency

Security Affairs

Many experts linked the Regin malware to the Five Eyes alliance , they found alleged references to the super spyware in a number of presentations leaked by Edward Snowden and according to malware researchers, it has been used in targeted attacks against government agencies in the EU and the Belgian telecoms company Belgacom.

Hacking 83
article thumbnail

Pegasus spyware has been here for years. We must stop ignoring it

Malwarebytes

Pegasus is spyware, and spyware is not made to respect privacy. According to NSO Group, its main spyware program is a beneficial tool for investigating and preventing terrorist attacks and maintaining the safety of the public. This was the worst time of my life and yet the killers were spying on me. They have no shame.

Spyware 122