SEOClerks

Apple iPhone Easily Remotely Hijacked with a Simple Familiar Text Message - Update to Avoid



Write the reason you're deleting this FAQ

Apple iPhone Easily Remotely Hijacked with a Simple Familiar Text Message - Update to Avoid

Are you an iPhone/iPad user? Is there a pending update for it? If so get it and update it now because according to Lookout security company and the Internet watchdog's that are Citizen Lab have discovered a zero-day hack that comes in the form of a simple text message which when activated by visiting the link, jail breaks and infects your iPhone or iPad installing malware that gives the hackers access to everything on your phone and is able to even log encrypted messages.

Even being able to activate the microphone and camera and hear everything around you as well as whatever the camera sees and tracking the movements of your device. They are also able to use the device to send the same message to all the people on their contacts list and email accounts list too. Spreading the zero days hack even further.

According to news reports this came to light after a Ahmed Monsoor who is a human rights activist, nearly had his iPhone hijacked to one of the zero-days being sold on the net right now. There are actual Israeli firms that are selling iOS zero-day hacks to hackers so they can hack and jikack your iPhone or iPad. He just got a simple familiar looking SMS text message on his iPhone with something he might have been interested in knowing. It was to find out more details about torture in state prisons, something he would have been interested in as an human rights activist, and there was a link to click on to read the article.

Fortunately for Ahmed he never clicked the link and decided to report it. But had he done so, his iPhone would have been instantly jail broken and infected with malware which is able to log and read encrypted messages, turning on the microphone and tracking it's movements around on the map. But if that wasn't ridiculous enough, the zero-days is being sold to world governments, world leaders and authorities by an Israeli cyber war group called NSO Group. But you can't exactly read up on NSO on some Wikepedia page. They're such a secretive group that they often change their name as a way to cover their tracks and avoid any unnecessary exposure and are said to be responsible for distributing a powerful, government-exclusive spyware product called Pegasus.
Apple iPhone Easily Remotely Hijacked with a Simple Familiar Text Message - Update to Avoid
Since this came to light, both Lookout and Citizen Lab have investigated the hack attempt and reported it to Apple which have since rolled out a patch for in an update as well as three other previously unknown zero day hacks that Apple have rolled out a patch for now. They're known as "zero days" because before now Apple didn't know about it until now. The hackers gain complete access and control of the infected device by a simple and familiar spear phishing SMS text message. Familiar because it was for something he was already interested in and that shows the lengths that these hackers will go to.

This particular group were specifically targeting people humanitarians & journalists in Yemen, Turkey, Mozambique, Mexico, Kenya, and the UAE. Apple said in a statement "We were made aware of this vulnerability and immediately fixed it with iOS 9.3.5. We advise all of our customers to always download the latest version of iOS to protect themselves against potential security exploits."

So if you're an iPhone user, are an humanitarian or journalist in Yemen, Turkey, Mozambique, Mexico, Kenya, and the UAE. Or both. You should update your iPhone/iPad to the latest iOS update 9.3.5. If you can't, try not to click on any links in emails or SMS text messages or from anywhere else like Whatsapp, Facebook etc etc until you are able to update and get the patch.

Not even anything familiar. This is how they get you! Hackers are getting very clever in the way they'll try to get you to open something or click on the link. Gone are the days when they would send out a billion messages or SMS' to random numbers. Now they do their homework and research first. Now they find out the background of the people they are sending their zero days to. Making the message much more likely to be opened and clicked on.

Sending a scientist something that says something about the latest theory will probably mean they're more interested to click that. Sending a teacher something about how school teachers are going to get paid double their salary by 2017 under new government rules (although a lie) will make it likely for that teacher to click that to check it out. Especially when it comes from someone on your contacts list or another scientist or teacher.

This is not a new trick though but it is a reminder. When it comes to messages and even SMS texts and stuff you get. Never trust it even if it's from someone you know!

Comments

Please login or sign up to leave a comment

Join
Everett
This sounds awesome to me, for some odd reason. The ability to effect millions of devices just by a single text message is outstanding but also very scary. Let's just say that I immediately installed the iOS 9.3.5 update upon reading this. I did notice that it is taking unusually longer to process the update which then means that a lot of users are updating at the same time.

This world is becoming mad, and hacks are now occurring each and every day. This system we have needs a total overhaul. Have you heard about Russia hacking the United States polling centers? Apparently they are trying to mess with the election, and they always try to interfere with our politics. Seems like big bullies to me.



Are you sure you want to delete this post?

Lynne
Yes I suppose you are right, it is mind blowing... and I guess should be in awe but it is scary.



Are you sure you want to delete this post?

Lynne
OMG that is hectic Mike! Thanks for the warning, I hope everyone takes note and updates their Apples phones and ipads!

It has become quite a scary day and age now when we can receive messages supposedly from people that we know that have something we may be interested in, but in reality it is a virus or a hack that has been sent to us.

I think for me that is the worst. I don't open messages or links from people I don't know but now they are figuring out how to send it from a number or email address in your contacts list. This for me is awful.



Are you sure you want to delete this post?

procoder
This reconfirm once again that nothing is 100% secure and un-hackable, could be a very dangerous exploit since they can infect your device via a simple url.

The good thing is that they have patched that vulnerability, but also people should be more informed that not everything that they receives in their phone is safe to open, in fact no one can hack you via a text message that contains an malware url without clicking it first, but the curiosity to know what’s behind that url yes.



Are you sure you want to delete this post?

Cristian
Clicking spammy links. Seriously, I never felt for such a thing, NEVER. I don't know, I think I can smell them or something, I always figure out if a message is genuine or not. I just don't understand how people fell for things like "Hey check out his hot girl: gooefe8.com/spammylinktype" - seriously? Just look at the damn link.

Anyways, this new virus is scary, maybe I'll get infected some day, that won't be pleasant, especially because I use an Internet banking app, guess they can also hack those...



Are you sure you want to delete this post?

idealmike
Yeah I know, I think they were using a different well known URL shortner though or that's usually how they get you by using a URL shortner that everyone is familar with already. Like Bitly or Goo.gl or fb.com. t.co etc. They can't see the actual link that it redirects to. Well you can but that might require installing another app as by default you are not shown the URL it redirects to. Sometimes it shows when you click on it (a small popup message warning you it's about to redirect to that URL) but not if it's from a shortened URL you've previously said yes to and that's a bad security flaw right there in iOS devices which is being used here by NSO group.

But yeah, if they are logging the activity and phoning home with what you type and press while using your banking app they may be able to learn your banking login pin code or pass code whatever it is yours uses to log in.



Are you sure you want to delete this post?

jacobupnext
Does this also work on Ipods? They both have iMessage.



Are you sure you want to delete this post?

idealmike
Thanks for Asking Nextant. These guys fully know what they are doing and very skilled in how they work. They are experts at finding exploits in iOS devices. So probably yes. All Apple devices that can receive messages in some way. iPods/iPhones/iPads too. So just to be on the safe side, if you are using an iPod, and you have a pending iOS update from Apple, don't delay in updating your iPod to the latest version of Apple iOS that is available for it.



Are you sure you want to delete this post?

Order Now
Process Time: 0.82131385803223

Possible Duplicate queries found!
MatchCountSQLScript
SELECT * FROM members_ledger WHERE ip = ? AND added>=unix_timestamp(NOW())-864001SELECT querystring, added FROM members_ledger WHERE ip = ? AND added>=unix_timestamp(NOW())-86400

/opt/clerks-staging/docroot/include/functions/includes/security.php 398 fetchMemberLedger() include_once()

SELECT * FROM `questions` as q JOIN categories_faq as c ON q.catid=c.CATID WHERE (q.status=1 OR (q.status=2 AND userid='') ) AND q.quesid='19291'1SELECT q.*, c.seo as CatSEO, c.name as CatName, c.parentid FROM `questions` as q JOIN categories_faq as c ON q.catid=c.CATID WHERE (q.status=1 OR (q.status=2 AND userid='') ) AND q.quesid='19291'

/opt/clerks-staging/docroot/viewfaq.php 496 () ()

SELECT * FROM seoclerks.members WHERE USERID='272'1SELECT * FROM seoclerks.members WHERE USERID='272'

/opt/clerks-staging/docroot/include/functions/includes/member.php 445 GetAllUserDetails() ()

SELECT * FROM categories_faq WHERE CATID='55'1SELECT CATID, seo, name, metatitle, h2header, metakeywords, metadescription, metaheader, parentid, image_name FROM categories_faq WHERE CATID='55'

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() GetCategorySeoFromType()

SELECT * FROM seoclerks.members WHERE USERID=2721SELECT googleplus_profile FROM seoclerks.members WHERE USERID=272

/opt/clerks-staging/docroot/include/functions/main.php 16914 GetGooglePlusProfileFromId() ()

SELECT * FROM ratings_faq as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=19291 LIMIT 51SELECT m.username FROM ratings_faq as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=19291 LIMIT 5

/opt/clerks-staging/docroot/include/functions/main.php 17159 GetVoters() ()

SELECT * FROM answers a, seoclerks.members b WHERE a.quesid='19291' AND a.userid=b.USERID and b.status='1' AND a.status=1 ORDER BY a.combined_votes DESC, a.date_answered asc1SELECT a.answer, a.USERID, a.upvotes, a.downvotes, a.ansid, a.parentid, a.combined_votes, a.date_answered, b.username, b.userlevel, b.profilepicture FROM answers a, seoclerks.members b WHERE a.quesid='19291' AND a.userid=b.USERID and b.status='1' AND a.status=1 ORDER BY a.combined_votes DESC, a.date_answered asc

/opt/clerks-staging/docroot/viewfaq.php 1245 () ()

SELECT * FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=106091 LIMIT 51SELECT m.username FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=106091 LIMIT 5

/opt/clerks-staging/docroot/include/functions/main.php 17159 GetVoters() ()

SELECT * FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=106230 LIMIT 51SELECT m.username FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=106230 LIMIT 5

/opt/clerks-staging/docroot/include/functions/main.php 17159 GetVoters() ()

SELECT * FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=106103 LIMIT 51SELECT m.username FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=106103 LIMIT 5

/opt/clerks-staging/docroot/include/functions/main.php 17159 GetVoters() ()

SELECT * FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=106205 LIMIT 51SELECT m.username FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=106205 LIMIT 5

/opt/clerks-staging/docroot/include/functions/main.php 17159 GetVoters() ()

SELECT * FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=106262 LIMIT 51SELECT m.username FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=106262 LIMIT 5

/opt/clerks-staging/docroot/include/functions/main.php 17159 GetVoters() ()

SELECT * FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=106284 LIMIT 51SELECT m.username FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=106284 LIMIT 5

/opt/clerks-staging/docroot/include/functions/main.php 17159 GetVoters() ()

SELECT * FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=106067 LIMIT 51SELECT m.username FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=106067 LIMIT 5

/opt/clerks-staging/docroot/include/functions/main.php 17159 GetVoters() ()

SELECT * FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=106070 LIMIT 51SELECT m.username FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=106070 LIMIT 5

/opt/clerks-staging/docroot/include/functions/main.php 17159 GetVoters() ()

UPDATE questions SET total_views = total_views + 1 WHERE quesid='19291'1UPDATE questions SET total_views = total_views + 1 WHERE quesid='19291'

/opt/clerks-staging/docroot/include/functions/main.php 1765 update_Faqviewcount() ()

SELECT * FROM questions WHERE quesid!='19291' AND status='1' AND (question like '%Apple iPhone Easily Remotely Hijacked Simple Familiar Text Message - Update Avoid%' OR question like '%Apple%' OR question like '%iPhone%' OR question like '%Easily%' OR question like '%Remotely%' OR question like '%Hijacked%' OR question like '%Simple%' OR question like '%Familiar%' OR question like '%Text%' OR question like '%Message%' OR question like '%Update%' OR question like '%Avoid%') -- ORDER BY RAND() LIMIT 151SELECT quesid, question, seo, userid FROM questions WHERE quesid!='19291' AND status='1' AND (question like '%Apple iPhone Easily Remotely Hijacked Simple Familiar Text Message - Update Avoid%' OR question like '%Apple%' OR question like '%iPhone%' OR question like '%Easily%' OR question like '%Remotely%' OR question like '%Hijacked%' OR question like '%Simple%' OR question like '%Familiar%' OR question like '%Text%' OR question like '%Message%' OR question like '%Update%' OR question like '%Avoid%') -- ORDER BY RAND() LIMIT 15

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() ()

SELECT * FROM seoclerks.members WHERE USERID='1490' limit 11SELECT profilepicture FROM seoclerks.members WHERE USERID='1490' limit 1

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() insert_get_member_profilepicture()

SELECT * FROM seoclerks.members WHERE USERID='9' limit 11SELECT profilepicture FROM seoclerks.members WHERE USERID='9' limit 1

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() insert_get_member_profilepicture()

SELECT * FROM seoclerks.members WHERE USERID='2637' limit 11SELECT profilepicture FROM seoclerks.members WHERE USERID='2637' limit 1

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() insert_get_member_profilepicture()

SELECT * FROM seoclerks.members WHERE USERID='1323' limit 11SELECT profilepicture FROM seoclerks.members WHERE USERID='1323' limit 1

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() insert_get_member_profilepicture()

SELECT * FROM members_ledger WHERE script='/opt/clerks-staging/docroot/viewfaq.php' AND querystring LIKE '%id=19291%' AND added>=UNIX_TIMESTAMP(NOW())-1200 GROUP BY USERID 1SELECT USERID, username FROM members_ledger WHERE script='/opt/clerks-staging/docroot/viewfaq.php' AND querystring LIKE '%id=19291%' AND added>=UNIX_TIMESTAMP(NOW())-1200 GROUP BY USERID

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() ()

SELECT * FROM categories1SELECT * FROM categories

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() parseRedundantQueriesCache()

select * from categories_software order by name asc1select * from categories_software order by name asc

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() insert_GetSoftwareCategories()

select * from categories_wanttobuy order by name asc1select * from categories_wanttobuy order by name asc

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() insert_get_wantcategories()

select * from categories_wanttotrade order by name asc1select * from categories_wanttotrade order by name asc

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() insert_get_tradecategories()

SELECT * FROM seoclerks.members WHERE USERID='2951.jpg'1SELECT profilepicture FROM seoclerks.members WHERE USERID='2951.jpg'

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() getUserProfileImage()

SELECT * FROM seoclerks.members WHERE USERID='306632.jpg'1SELECT profilepicture FROM seoclerks.members WHERE USERID='306632.jpg'

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() getUserProfileImage()

SELECT * FROM seoclerks.members WHERE USERID='377074.png'1SELECT profilepicture FROM seoclerks.members WHERE USERID='377074.png'

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() getUserProfileImage()

SELECT * FROM seoclerks.members WHERE USERID='134.png'1SELECT profilepicture FROM seoclerks.members WHERE USERID='134.png'

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() getUserProfileImage()

SELECT * FROM seoclerks.members WHERE USERID='272.jpg'1SELECT profilepicture FROM seoclerks.members WHERE USERID='272.jpg'

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() getUserProfileImage()

SELECT * FROM seoclerks.members WHERE USERID='398619.jpg'1SELECT profilepicture FROM seoclerks.members WHERE USERID='398619.jpg'

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() getUserProfileImage()

select * from categories_faq order by name asc1select * from categories_faq order by name asc

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() insert_GetFaqCategories()

Invalid SQL

count(*)sql1error_msg

Expensive SQL

Tuning the following SQL could reduce the server load substantially
LoadCountSQLMaxMin

Suspicious SQL

The following SQL have high average execution times
Avg TimeCountSQLMaxMin