{"id":51556,"date":"2023-04-19T12:57:22","date_gmt":"2023-04-19T12:57:22","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/34531\/NSO-Group-Escalates-Spyware-Tactics-With-3-New-iPhone-Zero-Click-Exploit-Chains.html"},"modified":"2023-04-19T12:57:22","modified_gmt":"2023-04-19T12:57:22","slug":"nso-group-escalates-spyware-tactics-with-3-new-iphone-zero-click-exploit-chains","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/nso-group-escalates-spyware-tactics-with-3-new-iphone-zero-click-exploit-chains\/","title":{"rendered":"NSO Group Escalates Spyware Tactics With 3 New iPhone Zero-Click Exploit Chains"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/04\/Pegasus-software-nso.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>The notorious NSO Group\u2019s Pegasus spyware continues to pose a threat, despite reports it was winding down its operations. New zero-click exploits found by watchdogs at Citizen Lab targeted two different remote attack surfaces on iPhones running iOS 15 and 16.<\/p>\n<p>PWNYOURHOME and FINDMYPWN are the first zero-click exploits to remotely and simultaneously target two Apple attack surfaces, according to Citizen Lab researchers. The use of zero-click exploits against iOS is not new, as past research showed similar tactics against iOS 14 devices with the NSO Group&#8217;s Pegasus spyware.<\/p>\n<p>NSO Group is notorious for the development and distribution of Pegasus spyware, widely used by both the private and government <a href=\"https:\/\/www.scmagazine.com\/analysis\/mobile\/the-threat-of-pegasus-style-spyware-could-creep-toward-the-business-community\">sectors across the globe for surveillance purposes <\/a>against journalists, human and civil rights activists, politicians and other individuals.<\/p>\n<p>In <a href=\"https:\/\/www.scmagazine.com\/news\/device-security\/supreme-court-denies-nso-group-appeal-metas-spyware-claims-lawsuit-can-proceed\">January, the Supreme Court denied<\/a> the NSO Group\u2019s petition for a writ of certiorari, which allowed an ongoing lawsuit against the Israeli company to proceed. Meta, which owns WhatsApp, has accused NSO of installing Pegasus on users\u2019 devices through unlawful access of WhatsApp servers to conduct surveillance on 1,400 individuals.<\/p>\n<p>The latest Citizen Lab research found three more zero-click exploits tied to the NSO Group being used to hack iOS 15 and iOS 16 devices. The tactics were discovered during their long-running investigation into NSO\u2019s campaign against several Mexican human rights groups.&nbsp;<\/p>\n<p>Network defenders should take note that these new tactics demonstrate that NSO Group is escalating its attempts to stop researchers from analyzing their tactics by blocking all traces of infection. Even when they\u2019re not successful, the group is certainly undermining these efforts.<\/p>\n<p>The first, PWNYOURHOME, is an iOS exploit that could enable an attacker to infiltrate the iMessage app to modify the HomeKit software. The issue was disclosed to Apple, which later fixed the vulnerability in the iOS 16.3.1 update.<\/p>\n<p>The attack is deployed in two phases, with each targeting a different iOS process. The first phase uses a daemon crash in the HomeKit app, then moves to download PNG images from the iMessage app, causing BlastDoor to crash. Citizen Lab could not determine how the exploit leaves BlastDoor, but they found the exploit later launches Pegasus through the iOS component called \u201cmediaserverd.\u201d<\/p>\n<p>Fortunately, it appears use of Apple\u2019s Lockdown Mode feature can successfully block PWNYOURHOME attacks levied by the notorious spyware vendor, as the function alerted users to the attempted attack visible through the notification display.<\/p>\n<p>However, there are no indications NSO has stopped using the exploit, suggesting the group \u201cmay have figured out a way to correct the notification issue, such as by fingerprinting Lockdown Mode.\u201d<\/p>\n<p>The second exploit, FINDMYPWN, effectively targets the fmfd process on the \u2018Find My\u2019 function of iOS 15.5 and iOS 15.6 devices. The exploit enables items to be written and deleted inside of the cache directory. Citizen Lab is limiting the forensic information it releases for the exploit, so as not to inform the NSO Group of possible evasion tactics.<\/p>\n<p>A final exploit was observed after the researchers reassessed earlier forensics. LATENTIMAGE first appeared in January 2022 impacting iOS 15 devices. Evidence suggests the exploit also uses the \u2018Find My\u2019 function, but it\u2019s initial access point is not confirmed.<\/p>\n<p>For Citizen Lab, \u201cthe use of multiple attack surfaces should encourage developers to think holistically about device security, and treat the entire surface reachable through a single identifier as a single surface.\u201d<\/p>\n<p>What\u2019s more, \u201cmodern exploit mitigations like pointer authentication codes significantly reduce attacker freedom to execute arbitrary code on a device,\u201d researchers wrote. But PWNYOURHOME shows that \u201creal-world attackers can, and do, find practical ways around these mitigations, such as by repurposing signed pointers located at known offsets in the iOS shared cache.\u201d<\/p>\n<p>As the NSO group continues these evasive tactics, Citizen Lab stressed that it\u2019s \u201cencouraging\u201d that Lockdown Mode successfully notified targets of ongoing attacks. While no tool is a cure-all, the feature could go far in dampening the impact of similar attack methods.<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/34531\/NSO-Group-Escalates-Spyware-Tactics-With-3-New-iPhone-Zero-Click-Exploit-Chains.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":51557,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[10482],"class_list":["post-51556","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinephoneflawisraelspywareapple"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NSO Group Escalates Spyware Tactics With 3 New iPhone Zero-Click Exploit Chains 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/nso-group-escalates-spyware-tactics-with-3-new-iphone-zero-click-exploit-chains\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NSO Group Escalates Spyware Tactics With 3 New iPhone Zero-Click Exploit Chains 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/nso-group-escalates-spyware-tactics-with-3-new-iphone-zero-click-exploit-chains\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-19T12:57:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/04\/Pegasus-software-nso.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nso-group-escalates-spyware-tactics-with-3-new-iphone-zero-click-exploit-chains\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nso-group-escalates-spyware-tactics-with-3-new-iphone-zero-click-exploit-chains\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"NSO Group Escalates Spyware Tactics With 3 New iPhone Zero-Click Exploit Chains\",\"datePublished\":\"2023-04-19T12:57:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nso-group-escalates-spyware-tactics-with-3-new-iphone-zero-click-exploit-chains\\\/\"},\"wordCount\":665,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nso-group-escalates-spyware-tactics-with-3-new-iphone-zero-click-exploit-chains\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/nso-group-escalates-spyware-tactics-with-3-new-iphone-zero-click-exploit-chains.jpg\",\"keywords\":[\"headline,phone,flaw,israel,spyware,apple\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nso-group-escalates-spyware-tactics-with-3-new-iphone-zero-click-exploit-chains\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nso-group-escalates-spyware-tactics-with-3-new-iphone-zero-click-exploit-chains\\\/\",\"name\":\"NSO Group Escalates Spyware Tactics With 3 New iPhone Zero-Click Exploit Chains 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nso-group-escalates-spyware-tactics-with-3-new-iphone-zero-click-exploit-chains\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nso-group-escalates-spyware-tactics-with-3-new-iphone-zero-click-exploit-chains\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/nso-group-escalates-spyware-tactics-with-3-new-iphone-zero-click-exploit-chains.jpg\",\"datePublished\":\"2023-04-19T12:57:22+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nso-group-escalates-spyware-tactics-with-3-new-iphone-zero-click-exploit-chains\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nso-group-escalates-spyware-tactics-with-3-new-iphone-zero-click-exploit-chains\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nso-group-escalates-spyware-tactics-with-3-new-iphone-zero-click-exploit-chains\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/nso-group-escalates-spyware-tactics-with-3-new-iphone-zero-click-exploit-chains.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/nso-group-escalates-spyware-tactics-with-3-new-iphone-zero-click-exploit-chains.jpg\",\"width\":1080,\"height\":810},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nso-group-escalates-spyware-tactics-with-3-new-iphone-zero-click-exploit-chains\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,phone,flaw,israel,spyware,apple\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinephoneflawisraelspywareapple\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"NSO Group Escalates Spyware Tactics With 3 New iPhone Zero-Click Exploit Chains\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NSO Group Escalates Spyware Tactics With 3 New iPhone Zero-Click Exploit Chains 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/nso-group-escalates-spyware-tactics-with-3-new-iphone-zero-click-exploit-chains\/","og_locale":"en_US","og_type":"article","og_title":"NSO Group Escalates Spyware Tactics With 3 New iPhone Zero-Click Exploit Chains 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/nso-group-escalates-spyware-tactics-with-3-new-iphone-zero-click-exploit-chains\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-04-19T12:57:22+00:00","og_image":[{"url":"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/04\/Pegasus-software-nso.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/nso-group-escalates-spyware-tactics-with-3-new-iphone-zero-click-exploit-chains\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/nso-group-escalates-spyware-tactics-with-3-new-iphone-zero-click-exploit-chains\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"NSO Group Escalates Spyware Tactics With 3 New iPhone Zero-Click Exploit Chains","datePublished":"2023-04-19T12:57:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/nso-group-escalates-spyware-tactics-with-3-new-iphone-zero-click-exploit-chains\/"},"wordCount":665,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/nso-group-escalates-spyware-tactics-with-3-new-iphone-zero-click-exploit-chains\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/04\/nso-group-escalates-spyware-tactics-with-3-new-iphone-zero-click-exploit-chains.jpg","keywords":["headline,phone,flaw,israel,spyware,apple"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/nso-group-escalates-spyware-tactics-with-3-new-iphone-zero-click-exploit-chains\/","url":"https:\/\/www.threatshub.org\/blog\/nso-group-escalates-spyware-tactics-with-3-new-iphone-zero-click-exploit-chains\/","name":"NSO Group Escalates Spyware Tactics With 3 New iPhone Zero-Click Exploit Chains 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/nso-group-escalates-spyware-tactics-with-3-new-iphone-zero-click-exploit-chains\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/nso-group-escalates-spyware-tactics-with-3-new-iphone-zero-click-exploit-chains\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/04\/nso-group-escalates-spyware-tactics-with-3-new-iphone-zero-click-exploit-chains.jpg","datePublished":"2023-04-19T12:57:22+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/nso-group-escalates-spyware-tactics-with-3-new-iphone-zero-click-exploit-chains\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/nso-group-escalates-spyware-tactics-with-3-new-iphone-zero-click-exploit-chains\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/nso-group-escalates-spyware-tactics-with-3-new-iphone-zero-click-exploit-chains\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/04\/nso-group-escalates-spyware-tactics-with-3-new-iphone-zero-click-exploit-chains.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/04\/nso-group-escalates-spyware-tactics-with-3-new-iphone-zero-click-exploit-chains.jpg","width":1080,"height":810},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/nso-group-escalates-spyware-tactics-with-3-new-iphone-zero-click-exploit-chains\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,phone,flaw,israel,spyware,apple","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinephoneflawisraelspywareapple\/"},{"@type":"ListItem","position":3,"name":"NSO Group Escalates Spyware Tactics With 3 New iPhone Zero-Click Exploit Chains"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51556","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=51556"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51556\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/51557"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=51556"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=51556"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=51556"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}