Share this
Zero-Click Apple Messenger Vulnerability: Critical Actions to Take
by Peter Lowe on Sep 14, 2021 12:00:00 AM
On September 13, Citizen Lab identified a zero-click exploit “in the wild” from NSO Group impacting all Apple Messenger products. This impacts all devices that use Messenger including iPhones, Mac, iPad and Apple Watches. Citizen Lab has dubbed this spyware “Forcedentry.”
Apple has issued an update to combat this vulnerability. The most important step you can take right now is to update your Apple devices to ensure you are no longer impacted. You should update to the following versions:
- macOS Big Sur 11.6
- iOS 14.8
- watchOS 7.6.2
You can further protect yourself from NSO spyware domains by blocking “Trackers” on DNSFilter. DNSFilter has proactively flagged all known NSO spyware domains as “Trackers,” thanks to Amnesty International’s excellent work investigating the group. Our Domain Intelligence team identified and added these trackers to our block list on July 20th, 2021.
Blocking the Trackers category will prevent any compromised devices from sending out data to their servers.
Please note, however, that the vulnerability itself is part of Apple’s Messenger, so will continue to exist and be exploitable by other malicious actors until affected devices have been updated as per Apple’s advisory.
It is imperative to ensure your devices always contain the latest patches to protect against vulnerabilities. Today's announcement about the zero-click exploit impacting Apple devices not only highlights the importance of the patch, but also is active in the wild. If you need to bide your time before making updates across your organization, changing your DNSFilter policy to block "Trackers" will offer an additional layer of protection against this zero-click exploit.
Share this
Categories
- Featured (176)
- Cybersecurity & IT (32)
- DNS (27)
- Cyber Threats (16)
- DNSFilter Updates (13)
- IndyCar (9)
- Product & Features (9)
- IT (8)
- Protective DNS (7)
- Content Filtering (6)
- DNSFilter Community (6)
- IT Challenges (4)
- Public Wi-Fi (4)
- AI (3)
- Deep Dive (3)
- MSP (3)
- Staying Ahead of Cyber Threats (3)
- Machine Learning (2)
- Malware (2)
- Phishing (2)
- Team (2)
- Compare (1)
- Cybersecurity Brief (1)
- Events (1)
- Ransomware (1)
- Tech (1)

The Old-School Operations Role: Backbone or Bottleneck?
In the early days of IT, the operations team was the unsung hero—the silent, and often siloed, force that kept everything running. They were responsible for the infrastructure: Servers, databases, and networks that powered the business. They managed deployments, monitored systems, and ensured uptime. If it was working, no one noticed them. If it wasn't? Well, then the questions started: "Wha...

When Vintage Goes Viral (In All the Wrong Ways)
Remember that time you found your old Tamagotchi and thought, "Hey, this could be fun again"? Well, cybercriminals are having a similar nostalgic moment, but instead of resurrecting digital pets, they're breathing new life into outdated malware and long-forgotten data breaches. Welcome to the world of recycled cyber threats, where everything old is terrifyingly new again.

The Growing Threat of Malicious Domains in Cybersecurity
As cybercriminals continue to evolve their tactics, domain-based attacks like cybersquatting, typosquatting, and other malicious domains have become a significant threat to businesses and individuals alike. These attacks are designed to exploit trust, impersonate brands, and mislead users into handing over sensitive information—often resulting in financial losses, data breaches, and reputat...