Apple Warned iOS Users in a Report of Pegasus-Like Mercenary Spyware

Apple Warned iOS Users in a Report of Pegasus-Like ‘Mercenary Spyware’

Apple Warned iOS Users in a Report of Pegasus-Like ‘Mercenary Spyware’

Cupertino:  Apple has notified its users in 91 countries, including India, regarding the potential intrusion of “mercenary spyware” onto their devices.  A report by The Economic Times indicates that Apple identified endeavors to gain unauthorized access to iPhones via advanced spyware techniques.

These forms of assaults are uncommon and considerably more sophisticated than the typical cyber threats or malware that individuals may encounter.

Comparable to the renowned Pegasus by NSO Group.

Apple’s recent advisory emphasizes the risks associated with mercenary spyware, such as the notorious Pegasus developed by NSO Group, by describing its complex structure and rarity.  According to the company’s cautionary email, the spyware is designed to covertly compromise iPhones associated with particular Apple IDs.

Apple underlined the gravity of this matter, positing that the attackers are preying upon individuals on the basis of their occupation or identity.

Guidance for individuals who may fall prey to this spyware program.

Apple has issued a support page update in response to the threat, providing guidance for individuals who may fall victim to this spyware. These threat notifications have been initiated by the organization in an effort to assist and direct affected users. Such cautionary notices have been issued by Apple previously.

A comparable notification was disseminated to users across multiple nations, including India, in October 2023, admonishing them of possible attacks sponsored by the government that could target their devices.

A warning was issued by CERT-In.

CERT-In, the national cybersecurity authority of India, has recently issued a high-risk advisory regarding Apple product vulnerabilities.  Spying on targeted systems, gaining access to sensitive information, executing unauthorized code, and circumventing security measures are all possible outcomes of exploiting these vulnerabilities.

Among the Apple hardware and software affected by this advisory are Safari, tvOS, watchOS, iPadOS, and tvOS.

How can your device be secured?

Protect Your Connection To mitigate the risk of unauthorized access, consistently utilize private and secure Wi-Fi networks.
Strengthen Login Protection Two-Factor Authentication (2FA) should be enabled to fortify the security of your credentials.
Safe Downloads To minimize the risk of malware, it is advisable to exclusively install applications and software from reputable sources, such as the Apple App Store.
Backup Consistently Important data should be backed up on a regular basis to safeguard against data loss caused by security breaches or system malfunctions.

About The Author:

Yogesh Naager is a content marketer who specializes in the cybersecurity and B2B space.  Besides writing for the News4Hackers blog, he’s also written for brands including CollegeDunia, Utsav Fashion, and NASSCOM.  Naager entered the field of content in an unusual way.  He began his career as an insurance sales executive, where he developed an interest in simplifying difficult concepts.  He also combines this interest with a love of narrative, which makes him a good writer in the cybersecurity field.  In the bottom line, he frequently writes for Craw Security.


About Author

Leave a Reply

Your email address will not be published. Required fields are marked *

Open chat
Can we help you?