- Apple has sued NSO Group, an Israeli firm that sells software to government agencies and law enforcement that allows them to hack iPhones.
- Earlier this year, Amnesty International said it discovered recent-model iPhones belonging to journalists and human rights lawyers that had been infected with NSO Group malware.
- Apple said on Tuesday it had patched the flaws that enabled the NSO Group malware.
In federal court on Tuesday, Apple sued NSO Group, an Israeli firm that sells software to government agencies and law enforcement that allows them to hack iPhones and read the data on them, including messages and other communications.
Earlier this year, Amnesty International said it discovered recent-model iPhones belonging to journalists and human rights lawyers that had been infected with NSO Group malware called Pegasus.
Apple is seeking a permanent injunction to ban NSO Group from using Apple software, services, or devices. It's also seeking damages over $75,000.
Get San Diego local news, weather forecasts, sports and lifestyle stories to your inbox. Sign up for NBC San Diego newsletters.
NSO Group software permits "attacks, including from sovereign governments that pay hundreds of millions of dollars to target and attack a tiny fraction of users with information of particular interest to NSO's customers," Apple said in its lawsuit, saying that it is not "ordinary consumer malware."
Apple also said on Tuesday it has patched the flaws that enabled the NSO Group software to access private data on iPhones with what are "zero-click" attacks where the malware is delivered through a text message and leaves little trace of infection.
Then, the Pegasus's users can remotely surveil the iPhone owner's activities, including by accessing the device's microphone and camera, and collect emails, text messages, and browsing history, Apple alleged in its lawsuit.
Apple said the attacks were only targeted at a small number of customers, and said on Tuesday it will inform iPhone users that may have been targeted by Pegasus malware.
"To deliver FORCEDENTRY to Apple devices, attackers created Apple IDs to send malicious data to a victim's device — allowing NSO Group or its clients to deliver and install Pegasus spyware without a victim's knowledge," Apple said in its announcement. "Though misused to deliver FORCEDENTRY, Apple servers were not hacked or compromised in the attacks."
Apple says that NSO Group have created Apple ID accounts and violated the iCloud terms of service to operate its spyware.
NSO Group is accused of using "0day" bugs to create its spyware, or flaws that Apple has not yet been able to fix. Once Apple fixes an exploit, it's no longer a 0day and users can protect themselves by updating their iPhone software to the latest version.
Earlier this year, Amnesty International said that it found evidence of a hacked iPhone 12 and had obtained a leaked list of 50,000 phone numbers targeted by NSO Group software. NSO Group software is alleged to have been used to monitor relatives and people close to Jamal Khashoggi, a Washington Post columnist who was killed in Turkey by assassins working on behalf of Saudi Arabia.
Amnesty International said earlier this year it discovered NSO Group malware on the iPhones of a French human rights lawyer, a French activist, an Indian journalist, and a Rwandan activist.
The U.S. Commerce Department blacklisted NSO Group earlier this month, prohibiting it from using American technology in its operations. Meta and Facebook subsidiary WhatsApp is also separately suing NSO Group.
NSO Group was not immediately available for comment. Earlier this year, a spokesperson said NSO sells its technology to law enforcement and intelligence agencies to prevent crime and terror acts, and that it vets its customers.
This is breaking news. Please check back for updates.