The Apple logo is displayed on the back of an iPhone on August 3, 2016 in London, England / Getty

Every device is vulnerable to the bug, unless actions are taken

A newly-discovered bug in iPhones could let anyone break into the handsets with just one tap.

Everyone owning an Apple handset has been urged to update their phone to get the latest version of iOS, which has the patch. Every device that hasn’t yet received that update could be liable to the attack.

Updates can be requested by heading to the iPhone’s setting app, clicking general and choosing security update. The phone will then retrieve and download the update itself.

Protected phones should be running iOS 9.3.5, the latest version of the software.

Apple said that it had issued the patch as soon as the security problem was discovered.

The problem took advantage of three different weaknesses in Apple’s operating system, which together allowed people to take complete control of iOS devices, according to reports published Thursday by the San Francisco-based Lookout smartphone security company and internet watchdog group Citizen Lab.

Both of the reports pointed to the NSO Group, a secretive Israeli firm, as the origin of the spyware.

"The threat actor has never been caught before," said Mike Murray, a researcher with Lookout, describing the program as "the most sophisticated spyware package we have seen in the market." 

The reports issued by Lookout and Citizen Lab — based at the University of Toronto's Munk School of Global Affairs — outlined how an iPhone could be completely compromised with the tap of a finger, a trick so coveted in the world of cyberespionage that in November a spyware broker said it had paid a $1 million dollar bounty to programmers who'd found a way to do it. Such a compromise would give hackers full control over the phone, allowing them to eavesdrop on calls, harvest messages, activate cameras and microphones and drain the device of its personal data. 

Arie van Deursen, a professor of software engineering at Delft University of Technology in the Netherlands, said both reports were credible and disturbing. Forensics expert Jonathan Zdziarski described the malicious program as a "serious piece of spyware." 

Apple said in a statement that it fixed the vulnerability immediately after learning about it, but the security hole may have gone unpatched had it not been for the wariness of an embattled human rights activist in the United Arab Emirates. 

Ahmed Mansoor, a well-known human rights defender, first alerted Citizen Lab to the spyware after receiving an unusual text message on Aug. 10. Promising to reveal details about torture in the United Arab Emirates' prisons, the unknown sender included a suspicious-looking link at the bottom of the message. 

Mansoor wasn't convinced. Not only had he been imprisoned, beaten, robbed and had his passport confiscated by the authorities over the years, Mansoor had also repeatedly found himself in the crosshairs of electronic eavesdropping operations. In fact Mansoor already had the dubious distinction of having weathered attacks from two separate brands of commercial spyware. And when he shared the suspicious text with Citizen Lab researcher Bill Marczak, they realised he'd been targeted by a third. 

Marczak, who'd already been looking into the NSO Group, said he and fellow-researcher John Scott-Railton turned to Lookout for help picking apart the malicious program, a process which Murray compared to "defusing a bomb." 

"It is amazing the level they've gone through to avoid detection," he said of the software's makers. "They have a hair-trigger self-destruct." 

What is Apple's strategy?

Working feverishly over a two-week period, the researchers found that Mansoor had been targeted by an unusually sophisticated piece of software which likely cost a small fortune to arm. 

"Ahmed Mansoor is a million-dollar human rights defender," Scott-Railton said. 

In a statement which stopped short of acknowledging that the spyware was its own, the NSO Group said its mission was to provide "authorized governments with technology that helps them combat terror and crime." 

The company said it had no knowledge of any particular incidents. It said it would not make any further comment. 

The apparent discovery of Israeli-made spyware being used to target a dissident in the United Arab Emirates raises awkward questions for both countries. The use of Israeli technology to police its own citizens is an uncomfortable strategy for an Arab country with no formal diplomatic ties to the Jewish state. And Israeli complicity in a cyberattack on an Arab dissident would seem to run counter to the country's self-description as a bastion of democracy in the Middle East. 

Authorities in both countries did not return calls seeking comment. 

Attorney Eitay Mack, who advocates for more transparency in Israeli arms exports, said his country's exports of surveillance software were not closely policed.

"Surveillance is not considered a lethal weapon," Mack said. And Israeli regulations "don't take into consideration human rights or that it would be used by a government to oppress dissidents." 

He noted that Israeli Prime minister Benjamin Netanyahu has cultivated ties with Arab Gulf states. Netanyahu in 2014 urged Saudi Arabia and the United Arab Emirates to join him in the war on terrorism. 

"Israel is looking for allies," Mack said. "And when Israel finds allies, it does not ask too many questions." 

Additional reporting by agencies

Comments