Amnesty International Reports HomeKit Vulnerability Being Leveraged in Spyware Assaults on iPhones

Amnesty International Reports HomeKit Vulnerability Being Leveraged in Spyware Assaults on iPhones

Amnesty International Reports HomeKit Vulnerability Being Leveraged in Spyware Assaults on iPhones


# Security Flaw in HomeKit: Aimed at Journalists and Activists

In a disconcerting finding, Amnesty International has disclosed that a security flaw within Apple’s HomeKit was leveraged to target the iPhones of Serbian journalists and activists. This event underscores the persistent hazards tied to sophisticated surveillance technologies and the possibility of government-backed assaults on civil society.

## The Involvement of NSO Group and Pegasus Spyware

The NSO Group, an Israeli tech company, is infamous for creating Pegasus spyware, which is sold to government and law enforcement entities. This spyware is particularly deceptive because of its capacity to exploit zero-day vulnerabilities—issues that are not known to the software provider, in this scenario, Apple. Pegasus can execute zero-click exploits, meaning a target can be compromised merely by receiving a harmful message, like an iMessage, without any action needed from the user.

In light of increasing worries about privacy and security, Apple has taken proactive steps to identify Pegasus attacks. The corporation now scans iPhones for signs of compromise and warns users if their devices may have been targeted.

## Confirmation of Attacks by Amnesty International

Amnesty International carried out an exhaustive investigation after Apple informed two Serbian activists about possible state-sponsored breaches on their devices. Following Apple’s advice, the victims contacted the SHARE Foundation in Belgrade, which teamed up with Amnesty and Access Now to conduct forensic examinations on the impacted iPhones. The investigation validated that both individuals were indeed targeted by NSO Group’s Pegasus spyware.

Amnesty’s report indicated that these attacks were not singular occurrences, as additional victims were later identified, highlighting a more extensive campaign against dissenting voices in Serbia.

## Abuse of HomeKit Vulnerability

The inquiry revealed that the assailants exploited a flaw within Apple’s HomeKit service to enable the spyware attacks. Amnesty International noted that the two compromised devices were breached within minutes of each other, utilizing various iCloud email addresses controlled by the attackers. This exploitation pattern closely resembles earlier NSO Group attacks that Amnesty has recorded, indicating a systematic strategy in targeting individuals through vulnerabilities in Apple’s infrastructure.

While specific information regarding the HomeKit vulnerability has not been revealed, it is likely that Apple is actively pursuing solutions to address and alleviate the issue to avert further exploitation.

## Wider Consequences: Android Devices Also Affected

The assault was not confined to iPhones; Android smartphones were also infiltrated. Reports suggest that Cellebrite technology was used to implant surveillance software on locked Android devices after victims sought police aid regarding crimes likely carried out by state actors. This approach took advantage of a separate vulnerability unique to Android, highlighting the varied strategies used by attackers to monitor and control dissenting individuals.

## Conclusion

The misuse of a HomeKit vulnerability to target journalists and activists raises significant concerns about privacy, security, and the ramifications of state-supported surveillance. As technology advances, so too do the methods utilized by those aiming to erode civil liberties. This occurrence serves as a stark reminder of the necessity for strong security measures and the continual vigilance required to safeguard individual rights against encroachment by powerful entities.

As the situation evolves, it is essential for tech firms like Apple to strengthen their security protocols and for civil society groups to push for more robust protections against such invasive tactics.