{"id":45138,"date":"2022-02-03T16:20:20","date_gmt":"2022-02-03T16:20:20","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/33067\/iPhone-Flaw-Exploited-By-Second-Israeli-Spy-Firm.html"},"modified":"2022-02-03T16:20:20","modified_gmt":"2022-02-03T16:20:20","slug":"iphone-flaw-exploited-by-second-israeli-spy-firm","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/iphone-flaw-exploited-by-second-israeli-spy-firm\/","title":{"rendered":"iPhone Flaw Exploited By Second Israeli Spy Firm"},"content":{"rendered":"<p data-testid=\"paragraph-0\" class=\"Text__text___2vZwzq Text__dark-grey___1T5z1- Text__regular___3orWU3 Text__large___1NuIuP Body__base___3K85eE Body__large_body___1_XkH1 article-body__element___vulnXJ\">WASHINGTON, Feb 3 (Reuters) &#8211; A flaw in Apple&#8217;s software <a href=\"https:\/\/www.reuters.com\/technology\/apple-files-lawsuit-against-nso-group-2021-11-23\" target=\"_blank\" class=\"Text__text___2vZwzq Text__dark-grey___1T5z1- Text__medium___3mY4FC Text__large___1NuIuP Link__underline_default___1RrRWa\" rel=\"noopener\">exploited by Israeli surveillance firm NSO Group<\/a> to break into iPhones in 2021 was simultaneously abused by a competing company, according to five people familiar with the matter.<\/p>\n<p data-testid=\"paragraph-1\" class=\"Text__text___2vZwzq Text__dark-grey___1T5z1- Text__regular___3orWU3 Text__large___1NuIuP Body__base___3K85eE Body__large_body___1_XkH1 article-body__element___vulnXJ\">QuaDream, the sources said, is a smaller and lower profile Israeli firm that also develops smartphone hacking tools intended for government clients.<\/p>\n<p data-testid=\"paragraph-2\" class=\"Text__text___2vZwzq Text__dark-grey___1T5z1- Text__regular___3orWU3 Text__large___1NuIuP Body__base___3K85eE Body__large_body___1_XkH1 article-body__element___vulnXJ\">The two rival businesses gained the same ability last year to remotely break into iPhones, according to the five sources, meaning that both firms could compromise Apple phones without an owner needing to open a malicious link. That two firms employed the same sophisticated hacking technique \u2013 known as a \u201czero-click\u201d \u2013 shows that phones are more vulnerable to powerful digital spying tools than the industry will admit, one expert said.<\/p>\n<div class=\"registration-prompt__container___bYuCJ7 registration-prompt__inline___lE4_O9 article-body__element___vulnXJ article-body__inline-registration-prompt___OCH-j6\">\n<div class=\"registration-prompt__text-content___3mCDaQ\">\n<h5 class=\"Text__text___2vZwzq Text__white___cSohpe Text__medium___3mY4FC Text__heading_5___Zn3DqM Heading__base___3qCIA2 Heading__heading_5___ruN8eD registration-prompt__heading___2LgQ-c\">Register now for FREE unlimited access to Reuters.com<\/h5>\n<p><button class=\"Button__button___3B9OxT Button__secondary___1qNGNf Button__round___SR4lqT TextButton__container___2ipwLP registration-prompt__button-text___eFmPbk\" type=\"button\"><\/p>\n<p><span class=\"Text__text___2vZwzq Text__inherit-color___1Jv4Eu Text__bold___2pIB3c Text__default___1ZhUwy TextButton__medium___1HuzMG\">Register<\/span><\/p>\n<p><\/button><\/div>\n<\/div>\n<p data-testid=\"paragraph-3\" class=\"Text__text___2vZwzq Text__dark-grey___1T5z1- Text__regular___3orWU3 Text__large___1NuIuP Body__base___3K85eE Body__large_body___1_XkH1 article-body__element___vulnXJ\">&#8220;People want to believe they&#8217;re secure, and phone companies want you to believe they&#8217;re secure. What we&#8217;ve learned is, they&#8217;re not,&#8221; said Dave Aitel, a partner at Cordyceps Systems, a cybersecurity firm.<\/p>\n<p data-testid=\"paragraph-4\" class=\"Text__text___2vZwzq Text__dark-grey___1T5z1- Text__regular___3orWU3 Text__large___1NuIuP Body__base___3K85eE Body__large_body___1_XkH1 article-body__element___vulnXJ\">Experts analyzing intrusions engineered by NSO Group and QuaDream since last year believe the two companies used very similar software exploits, known as <a href=\"https:\/\/citizenlab.ca\/2021\/09\/forcedentry-nso-group-imessage-zero-click-exploit-captured-in-the-wild\" target=\"_blank\" class=\"Text__text___2vZwzq Text__dark-grey___1T5z1- Text__medium___3mY4FC Text__large___1NuIuP Link__underline_default___1RrRWa\" rel=\"noopener\">ForcedEntry<\/a>, to hijack iPhones.<\/p>\n<p data-testid=\"paragraph-5\" class=\"Text__text___2vZwzq Text__dark-grey___1T5z1- Text__regular___3orWU3 Text__large___1NuIuP Body__base___3K85eE Body__large_body___1_XkH1 article-body__element___vulnXJ\">An exploit is computer code designed to leverage a set of specific software vulnerabilities, giving a hacker unauthorized access to data.<\/p>\n<p data-testid=\"paragraph-6\" class=\"Text__text___2vZwzq Text__dark-grey___1T5z1- Text__regular___3orWU3 Text__large___1NuIuP Body__base___3K85eE Body__large_body___1_XkH1 article-body__element___vulnXJ\">The analysts believed NSO and QuaDream&#8217;s exploits were similar because they leveraged many of the same vulnerabilities hidden deep inside Apple&#8217;s instant messaging platform and used a comparable approach to plant malicious software on targeted devices, according to three of the sources.<\/p>\n<p data-testid=\"paragraph-7\" class=\"Text__text___2vZwzq Text__dark-grey___1T5z1- Text__regular___3orWU3 Text__large___1NuIuP Body__base___3K85eE Body__large_body___1_XkH1 article-body__element___vulnXJ\">Bill Marczak, a security researcher with digital watchdog Citizen Lab who has been studying both companies&#8217; hacking tools, told Reuters that QuaDream&#8217;s zero-click capability seemed &#8220;on par&#8221; with NSO&#8217;s.<\/p>\n<p data-testid=\"paragraph-8\" class=\"Text__text___2vZwzq Text__dark-grey___1T5z1- Text__regular___3orWU3 Text__large___1NuIuP Body__base___3K85eE Body__large_body___1_XkH1 article-body__element___vulnXJ\">Reuters made repeated attempts to reach QuaDream for comment, sending messages to executives and business partners. A Reuters journalist last week visited QuaDream\u2019s office, in the Tel Aviv suburb of Ramat Gan, but no one answered the door. Israeli lawyer Vibeke Dank, whose email was listed on QuaDream&#8217;s corporate registration form, also did not return repeated messages.<\/p>\n<p data-testid=\"paragraph-9\" class=\"Text__text___2vZwzq Text__dark-grey___1T5z1- Text__regular___3orWU3 Text__large___1NuIuP Body__base___3K85eE Body__large_body___1_XkH1 article-body__element___vulnXJ\">An Apple spokesman declined to comment on QuaDream or say what if any action they planned to take with regard to the company.<\/p>\n<p data-testid=\"paragraph-10\" class=\"Text__text___2vZwzq Text__dark-grey___1T5z1- Text__regular___3orWU3 Text__large___1NuIuP Body__base___3K85eE Body__large_body___1_XkH1 article-body__element___vulnXJ\">ForcedEntry is viewed as <a href=\"https:\/\/googleprojectzero.blogspot.com\/2021\/12\/a-deep-dive-into-nso-zero-click.html\" target=\"_blank\" class=\"Text__text___2vZwzq Text__dark-grey___1T5z1- Text__medium___3mY4FC Text__large___1NuIuP Link__underline_default___1RrRWa\" rel=\"noopener\">&#8220;one of the most technically sophisticated exploits&#8221;<\/a> ever captured by security researchers.<\/p>\n<p data-testid=\"paragraph-11\" class=\"Text__text___2vZwzq Text__dark-grey___1T5z1- Text__regular___3orWU3 Text__large___1NuIuP Body__base___3K85eE Body__large_body___1_XkH1 article-body__element___vulnXJ\">So similar were the two versions of ForcedEntry that when Apple fixed the underlying flaws in September 2021 it rendered both NSO and QuaDream\u2019s spy software ineffective, according to two people familiar with the matter.<\/p>\n<p data-testid=\"paragraph-12\" class=\"Text__text___2vZwzq Text__dark-grey___1T5z1- Text__regular___3orWU3 Text__large___1NuIuP Body__base___3K85eE Body__large_body___1_XkH1 article-body__element___vulnXJ\">In a written statement, an NSO spokeswoman said the company &#8220;did not cooperate&#8221; with QuaDream but that &#8220;the cyber intelligence industry continues to grow rapidly globally.&#8221;<\/p>\n<p data-testid=\"paragraph-13\" class=\"Text__text___2vZwzq Text__dark-grey___1T5z1- Text__regular___3orWU3 Text__large___1NuIuP Body__base___3K85eE Body__large_body___1_XkH1 article-body__element___vulnXJ\">Apple <a href=\"https:\/\/www.reuters.com\/technology\/apple-files-lawsuit-against-nso-group-2021-11-23\" target=\"_blank\" class=\"Text__text___2vZwzq Text__dark-grey___1T5z1- Text__medium___3mY4FC Text__large___1NuIuP Link__underline_default___1RrRWa\" rel=\"noopener\">sued<\/a> NSO Group over ForcedEntry in November, claiming that NSO had violated Apple&#8217;s user terms and services agreement. The case is still in its early stages.<\/p>\n<figure data-testid=\"image-0\" class=\"article-image__figure___Yq3IH_ article-body__element___vulnXJ\">\n<div class=\"StatefulImage__container___1fQtnO StatefulImage__light___2Bq_g7 article-image__image___36S_PO\">\n<div class=\"StatefulImage__image___1OcDTh\"><noscript><img decoding=\"async\" src=\"https:\/\/cloudfront-us-east-2.images.arcpublishing.com\/reuters\/JIOAPCORYNOJZNZFBFSNDZPTTU.jpg\" alt=\"The entrance to an office listed as belonging to Quadream is seen in a high rise building in Ramat Gan, Israel, January 25, 2022. REUTERS\/Nir Elias\" title><\/noscript><\/div>\n<\/div><figcaption class=\"Text__text___2vZwzq Text__medium-grey___tow7K6 Text__regular___3orWU3 Text__small___10gNo_ Body__base___3K85eE Body__caption___3SJBpz article-image__figcaption___36u1I6\">The entrance to an office listed as belonging to Quadream is seen in a high rise building in Ramat Gan, Israel, January 25, 2022. REUTERS\/Nir Elias<\/figcaption><\/figure>\n<p data-testid=\"paragraph-14\" class=\"Text__text___2vZwzq Text__dark-grey___1T5z1- Text__regular___3orWU3 Text__large___1NuIuP Body__base___3K85eE Body__large_body___1_XkH1 article-body__element___vulnXJ\">In its lawsuit, Apple said that it &#8220;continuously and successfully fends off a variety of hacking attempts.&#8221; NSO has denied any wrongdoing.<\/p>\n<p data-testid=\"paragraph-15\" class=\"Text__text___2vZwzq Text__dark-grey___1T5z1- Text__regular___3orWU3 Text__large___1NuIuP Body__base___3K85eE Body__large_body___1_XkH1 article-body__element___vulnXJ\">Spyware companies have long argued they sell high-powered technology to help governments thwart national security threats. But human rights groups and journalists have repeatedly documented the use of spyware to attack <a href=\"https:\/\/www.reuters.com\/article\/apple-thailand-cyber-idCAKBN2I914H\" target=\"_blank\" class=\"Text__text___2vZwzq Text__dark-grey___1T5z1- Text__medium___3mY4FC Text__large___1NuIuP Link__underline_default___1RrRWa\" rel=\"noopener\">civil society<\/a>, <a href=\"https:\/\/www.reuters.com\/world\/africa\/prominent-egyptian-opposition-activists-phone-hacked-watchdog-2021-12-16\" target=\"_blank\" class=\"Text__text___2vZwzq Text__dark-grey___1T5z1- Text__medium___3mY4FC Text__large___1NuIuP Link__underline_default___1RrRWa\" rel=\"noopener\">undermine political opposition<\/a>, and <a href=\"https:\/\/www.reuters.com\/world\/europe\/polish-commission-told-more-phone-hacking-victims-likely-2022-01-17\" target=\"_blank\" class=\"Text__text___2vZwzq Text__dark-grey___1T5z1- Text__medium___3mY4FC Text__large___1NuIuP Link__underline_default___1RrRWa\" rel=\"noopener\">interfere with elections<\/a>.<\/p>\n<p data-testid=\"paragraph-16\" class=\"Text__text___2vZwzq Text__dark-grey___1T5z1- Text__regular___3orWU3 Text__large___1NuIuP Body__base___3K85eE Body__large_body___1_XkH1 article-body__element___vulnXJ\">Apple notified thousands of ForcedEntry targets in November, making <a href=\"https:\/\/www.haaretz.com\/israel-news\/.premium-report-police-used-nso-spyware-to-hack-phones-of-israeli-mayors-without-warrant-1.10558932\" target=\"_blank\" class=\"Text__text___2vZwzq Text__dark-grey___1T5z1- Text__medium___3mY4FC Text__large___1NuIuP Link__underline_default___1RrRWa\" rel=\"noopener\">elected officials<\/a>, <a href=\"https:\/\/www.reuters.com\/technology\/salvadoran-journalists-phones-hacked-with-spyware-report-finds-2022-01-13\" target=\"_blank\" class=\"Text__text___2vZwzq Text__dark-grey___1T5z1- Text__medium___3mY4FC Text__large___1NuIuP Link__underline_default___1RrRWa\" rel=\"noopener\">journalists<\/a>, and <a href=\"https:\/\/www.reuters.com\/article\/apple-thailand-cyber-idCAKBN2I914H\" target=\"_blank\" class=\"Text__text___2vZwzq Text__dark-grey___1T5z1- Text__medium___3mY4FC Text__large___1NuIuP Link__underline_default___1RrRWa\" rel=\"noopener\">human rights workers<\/a> around the world realize they had been placed under surveillance.<\/p>\n<p data-testid=\"paragraph-17\" class=\"Text__text___2vZwzq Text__dark-grey___1T5z1- Text__regular___3orWU3 Text__large___1NuIuP Body__base___3K85eE Body__large_body___1_XkH1 article-body__element___vulnXJ\">In Uganda, for example, NSO&#8217;s ForcedEntry was used to spy on U.S. diplomats, <a href=\"https:\/\/www.reuters.com\/technology\/exclusive-us-state-department-phones-hacked-with-israeli-company-spyware-sources-2021-12-03\" target=\"_blank\" class=\"Text__text___2vZwzq Text__dark-grey___1T5z1- Text__medium___3mY4FC Text__large___1NuIuP Link__underline_default___1RrRWa\" rel=\"noopener\">Reuters reported<\/a>.<\/p>\n<p data-testid=\"paragraph-18\" class=\"Text__text___2vZwzq Text__dark-grey___1T5z1- Text__regular___3orWU3 Text__large___1NuIuP Body__base___3K85eE Body__large_body___1_XkH1 article-body__element___vulnXJ\">In addition to the Apple lawsuit, Meta&#8217;s WhatsApp is also litigating over the alleged abuse of its platform. In November, NSO was put on a trade blacklist by the U.S. Commerce Department over human rights concerns. <a href=\"https:\/\/www.reuters.com\/technology\/us-blacklists-four-companies-israel-russia-singapore-citing-spyware-2021-11-03\/\" class=\"Text__text___2vZwzq Text__dark-grey___1T5z1- Text__medium___3mY4FC Text__large___1NuIuP Link__underline_default___1RrRWa\"> read more <\/a><\/p>\n<p data-testid=\"paragraph-19\" class=\"Text__text___2vZwzq Text__dark-grey___1T5z1- Text__regular___3orWU3 Text__large___1NuIuP Body__base___3K85eE Body__large_body___1_XkH1 article-body__element___vulnXJ\">Unlike NSO, QuaDream has kept a lower profile despite serving some of the same government clients. The company has no website touting its business and employees have been told to keep any reference to their employer off social media, according to a person familiar with the company.<\/p>\n<p data-testid=\"paragraph-20\" class=\"Text__text___2vZwzq Text__dark-grey___1T5z1- Text__regular___3orWU3 Text__large___1NuIuP Body__base___3K85eE Body__large_body___1_XkH1 article-body__element___vulnXJ\">REIGN<\/p>\n<p data-testid=\"paragraph-21\" class=\"Text__text___2vZwzq Text__dark-grey___1T5z1- Text__regular___3orWU3 Text__large___1NuIuP Body__base___3K85eE Body__large_body___1_XkH1 article-body__element___vulnXJ\">QuaDream was founded in 2016 by Ilan Dabelstein, a former Israeli military official, and by two former NSO employees, Guy Geva and Nimrod Reznik, according to Israeli corporate records and two people familiar with the business. Reuters could not reach the three executives for comment.<\/p>\n<p data-testid=\"paragraph-22\" class=\"Text__text___2vZwzq Text__dark-grey___1T5z1- Text__regular___3orWU3 Text__large___1NuIuP Body__base___3K85eE Body__large_body___1_XkH1 article-body__element___vulnXJ\">Like NSO&#8217;s Pegasus spyware, QuaDream&#8217;s flagship product &#8211; called REIGN &#8211; could take control of a smartphone, scooping up instant messages from services such as WhatsApp, Telegram, and Signal, as well as emails, photos, texts and contacts, according to two product brochures from 2019 and 2020 which were reviewed by Reuters.<\/p>\n<p data-testid=\"paragraph-23\" class=\"Text__text___2vZwzq Text__dark-grey___1T5z1- Text__regular___3orWU3 Text__large___1NuIuP Body__base___3K85eE Body__large_body___1_XkH1 article-body__element___vulnXJ\">REIGN&#8217;s \u201cPremium Collection\u201d capabilities included the &#8220;real time call recordings&#8221;, &#8220;camera activation &#8211; front and back&#8221; and &#8220;microphone activation&#8221;, one brochure said.<\/p>\n<p data-testid=\"paragraph-24\" class=\"Text__text___2vZwzq Text__dark-grey___1T5z1- Text__regular___3orWU3 Text__large___1NuIuP Body__base___3K85eE Body__large_body___1_XkH1 article-body__element___vulnXJ\">Prices appeared to vary. One QuaDream system, which would have given customers the ability to launch 50 smartphone break-ins per year, was being offered for $2.2 million exclusive of maintenance costs, according to the 2019 brochure. Two people familiar with the software&#8217;s sales said the price for REIGN was typically higher.<\/p>\n<p data-testid=\"paragraph-25\" class=\"Text__text___2vZwzq Text__dark-grey___1T5z1- Text__regular___3orWU3 Text__large___1NuIuP Body__base___3K85eE Body__large_body___1_XkH1 article-body__element___vulnXJ\">Over the years, QuaDream and NSO Group employed some of the same engineering talent, according to three people familiar with the matter. Two of those sources said the companies did not collaborate on their iPhone hacks, coming up with their own ways to take advantage of vulnerabilities.<\/p>\n<p data-testid=\"paragraph-26\" class=\"Text__text___2vZwzq Text__dark-grey___1T5z1- Text__regular___3orWU3 Text__large___1NuIuP Body__base___3K85eE Body__large_body___1_XkH1 article-body__element___vulnXJ\">Several of QuaDream&#8217;s buyers have also overlapped with NSO&#8217;s, four of the sources said, including Saudi Arabia and Mexico &#8211; both of whom have been accused of misusing spy software to target political opponents.<\/p>\n<p data-testid=\"paragraph-27\" class=\"Text__text___2vZwzq Text__dark-grey___1T5z1- Text__regular___3orWU3 Text__large___1NuIuP Body__base___3K85eE Body__large_body___1_XkH1 article-body__element___vulnXJ\">One of QuaDream&#8217;s first clients was the Singaporean government, two of the sources said, and documentation reviewed by Reuters shows the company&#8217;s surveillance technology was pitched to the Indonesian government as well. Reuters couldn&#8217;t determine if Indonesia became a client.<\/p>\n<p data-testid=\"paragraph-28\" class=\"Text__text___2vZwzq Text__dark-grey___1T5z1- Text__regular___3orWU3 Text__large___1NuIuP Body__base___3K85eE Body__large_body___1_XkH1 article-body__element___vulnXJ\">Mexican, Singaporean, Indonesian and Saudi officials did not return messages seeking comment about QuaDream.<\/p>\n<div class=\"registration-prompt__container___bYuCJ7 registration-prompt__inline___lE4_O9 article-body__element___vulnXJ\">\n<div class=\"registration-prompt__text-content___3mCDaQ\">\n<h5 class=\"Text__text___2vZwzq Text__white___cSohpe Text__medium___3mY4FC Text__heading_5___Zn3DqM Heading__base___3qCIA2 Heading__heading_5___ruN8eD registration-prompt__heading___2LgQ-c\">Register now for FREE unlimited access to Reuters.com<\/h5>\n<p><button class=\"Button__button___3B9OxT Button__secondary___1qNGNf Button__round___SR4lqT TextButton__container___2ipwLP registration-prompt__button-text___eFmPbk\" type=\"button\"><\/p>\n<p><span class=\"Text__text___2vZwzq Text__inherit-color___1Jv4Eu Text__bold___2pIB3c Text__default___1ZhUwy TextButton__medium___1HuzMG\">Register<\/span><\/p>\n<p><\/button><\/div>\n<\/div>\n<p><span class=\"Text__text___2vZwzq Text__dark-grey___1T5z1- Text__regular___3orWU3 Text__default___1ZhUwy sign-off__text___1kMQGj\">Reporting by Christopher Bing and Raphael Satter in Washington. Joseph Menn in San Francisco, Nir Elias in Ramat Gan, Israel, Dan Williams in Jerusalem, and Michele Kambas in Nicosia, Cyprus contributed reporting. Editing by Chris Sanders and Edward Tobin<\/span><\/p>\n<p class=\"Text__text___2vZwzq Text__dark-grey___1T5z1- Text__regular___3orWU3 Text__large___1NuIuP Body__base___3K85eE Body__large_body___1_XkH1 article-body__element___vulnXJ\">Our Standards: <a href=\"https:\/\/www.thomsonreuters.com\/en\/about-us\/trust-principles.html\" target=\"_blank\" class=\"Text__text___2vZwzq Text__dark-grey___1T5z1- Text__medium___3mY4FC Text__large___1NuIuP Link__underline_default___1RrRWa\" rel=\"noopener\">The Thomson Reuters Trust Principles.<\/a><\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/33067\/iPhone-Flaw-Exploited-By-Second-Israeli-Spy-Firm.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":45139,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[9853],"class_list":["post-45138","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinegovernmentprivacyphoneflawisraelspywareapple"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>iPhone Flaw Exploited By Second Israeli Spy Firm 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/iphone-flaw-exploited-by-second-israeli-spy-firm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"iPhone Flaw Exploited By Second Israeli Spy Firm 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/iphone-flaw-exploited-by-second-israeli-spy-firm\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-03T16:20:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cloudfront-us-east-2.images.arcpublishing.com\/reuters\/JIOAPCORYNOJZNZFBFSNDZPTTU.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iphone-flaw-exploited-by-second-israeli-spy-firm\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iphone-flaw-exploited-by-second-israeli-spy-firm\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"iPhone Flaw Exploited By Second Israeli Spy Firm\",\"datePublished\":\"2022-02-03T16:20:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iphone-flaw-exploited-by-second-israeli-spy-firm\\\/\"},\"wordCount\":1076,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iphone-flaw-exploited-by-second-israeli-spy-firm\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/iphone-flaw-exploited-by-second-israeli-spy-firm-scaled.jpg\",\"keywords\":[\"headline,government,privacy,phone,flaw,israel,spyware,apple\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iphone-flaw-exploited-by-second-israeli-spy-firm\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iphone-flaw-exploited-by-second-israeli-spy-firm\\\/\",\"name\":\"iPhone Flaw Exploited By Second Israeli Spy Firm 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iphone-flaw-exploited-by-second-israeli-spy-firm\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iphone-flaw-exploited-by-second-israeli-spy-firm\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/iphone-flaw-exploited-by-second-israeli-spy-firm-scaled.jpg\",\"datePublished\":\"2022-02-03T16:20:20+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iphone-flaw-exploited-by-second-israeli-spy-firm\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iphone-flaw-exploited-by-second-israeli-spy-firm\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iphone-flaw-exploited-by-second-israeli-spy-firm\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/iphone-flaw-exploited-by-second-israeli-spy-firm-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/iphone-flaw-exploited-by-second-israeli-spy-firm-scaled.jpg\",\"width\":2560,\"height\":1707},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iphone-flaw-exploited-by-second-israeli-spy-firm\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,government,privacy,phone,flaw,israel,spyware,apple\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinegovernmentprivacyphoneflawisraelspywareapple\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"iPhone Flaw Exploited By Second Israeli Spy Firm\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"iPhone Flaw Exploited By Second Israeli Spy Firm 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/iphone-flaw-exploited-by-second-israeli-spy-firm\/","og_locale":"en_US","og_type":"article","og_title":"iPhone Flaw Exploited By Second Israeli Spy Firm 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/iphone-flaw-exploited-by-second-israeli-spy-firm\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-02-03T16:20:20+00:00","og_image":[{"url":"https:\/\/cloudfront-us-east-2.images.arcpublishing.com\/reuters\/JIOAPCORYNOJZNZFBFSNDZPTTU.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/iphone-flaw-exploited-by-second-israeli-spy-firm\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/iphone-flaw-exploited-by-second-israeli-spy-firm\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"iPhone Flaw Exploited By Second Israeli Spy Firm","datePublished":"2022-02-03T16:20:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/iphone-flaw-exploited-by-second-israeli-spy-firm\/"},"wordCount":1076,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/iphone-flaw-exploited-by-second-israeli-spy-firm\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/02\/iphone-flaw-exploited-by-second-israeli-spy-firm-scaled.jpg","keywords":["headline,government,privacy,phone,flaw,israel,spyware,apple"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/iphone-flaw-exploited-by-second-israeli-spy-firm\/","url":"https:\/\/www.threatshub.org\/blog\/iphone-flaw-exploited-by-second-israeli-spy-firm\/","name":"iPhone Flaw Exploited By Second Israeli Spy Firm 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/iphone-flaw-exploited-by-second-israeli-spy-firm\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/iphone-flaw-exploited-by-second-israeli-spy-firm\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/02\/iphone-flaw-exploited-by-second-israeli-spy-firm-scaled.jpg","datePublished":"2022-02-03T16:20:20+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/iphone-flaw-exploited-by-second-israeli-spy-firm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/iphone-flaw-exploited-by-second-israeli-spy-firm\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/iphone-flaw-exploited-by-second-israeli-spy-firm\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/02\/iphone-flaw-exploited-by-second-israeli-spy-firm-scaled.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/02\/iphone-flaw-exploited-by-second-israeli-spy-firm-scaled.jpg","width":2560,"height":1707},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/iphone-flaw-exploited-by-second-israeli-spy-firm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,government,privacy,phone,flaw,israel,spyware,apple","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinegovernmentprivacyphoneflawisraelspywareapple\/"},{"@type":"ListItem","position":3,"name":"iPhone Flaw Exploited By Second Israeli Spy Firm"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45138","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=45138"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45138\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/45139"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=45138"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=45138"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=45138"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}