Apple Zero-Clock flaws in messages abused by journalist spies using Paragon Spyware

8 Min Read
8 Min Read

Apple has revealed that the currently patched security flaws present in messaging apps are actively exploited in the wild to target civil society members in sophisticated cyber attacks.

The vulnerability tracked as CVE-2025-43200 was addressed on February 10, 2025 as part of iOS 18.3.1, iPados 18.3.1, iPados 17.7.5, Macos Sequoia 15.3.1, Macos Sonoma 14.7.4, Macos Ventura 13.7.4, Watchos 11.3.1, and Visions 2.1.1.1.4, Macos Socona 14.7.4, Macos Socona 14.7.4, and Macos Socona 14.7.4.

“There was a logic issue when dealing with malicious photos or videos shared via iCloud links,” the company said in its advisory, adding that the vulnerability was addressed with improved checks.

The iPhone maker also acknowledged that the vulnerability could have been “exploited in a highly sophisticated attack, especially on targeted individuals.”

It is worth noting that iOS 18.3.1, iPados 18.3.1, and iPados 17.7.5 updates also resolved another actively utilized zero day tracked as CVE-2025-24200. Currently, it is currently unknown why Apple chose not to reveal the existence of this flaw.

While Apple did not share details of the nature of the attack that weaponized CVE-2025-43200, it said Citizen Lab had unearthed forensic evidence that it targeted Italian journalist Ciro Pellegrino and prominent European journalists, and Italian journalist Ciro Pellegrino and prominent European journalists to infect Paragon’s Graphite Spyware.

The interdisciplinary research center described the attack as zero clicks. This means that vulnerabilities can be triggered on the target device without the need for user interaction.

“One of the journalist devices was compromised with Paragon’s graphite spyware from January to early February 2025 while running iOS 18.2.1,” said Bill Malzak and John Scott Railton. “I believe this infection was not visible as a target.”

Both individuals were notified by Apple on April 29, 2025 that they were targeted with advanced spyware. Starting in November 2021, Apple began sending threat notifications to alert users suspected of being targeted by state-sponsored attackers.

See also  Storm-1977 uses Azurechecker to hit the education cloud and deploy over 200 crypto mining vessels

Graphite is a surveillance tool developed by Israeli private sector attack actor (PSOA) Paragon. Access messages, emails, cameras, microphones, and location data without user actions, making detection and prevention particularly difficult. Spyware is usually deployed by government clients under the guise of a national security investigation.

Citizen Lab said that two journalists deployed graphite tools by sending Imessages from the same Apple account (codenamed “Attacker1”) indicating that the account could have been used by a single Paragon customer and used by the target.

Spy Journalists using Paragon Spyware

The development is the latest twist in a scandal that broke out in January when Meta-owned Whatsapp happened, which had meta-owned Whatsapp had been rolled out to dozens of users around the world, including Pellegrino colleague Francesco Cancellato. Overall, a total of seven have been publicly identified as victims of paragon targeting and infection so far.

Earlier this week, the Israeli spyware manufacturer said it had ended its contract with Italy and refused to let the government independently confirm that Italian authorities had not broken into the phones of investigative journalists.

“The company has provided both the Italian government and the parliament with a way to determine whether it was being used against journalists in violation of Italian law and terms of contract,” he said in a statement to Haaretz.

However, the Italian government said the decision was mutual and rejected the offer due to national security concerns.

In a report released last week, the Republic’s Parliamentary Committee on Security (Copasir) confirmed that Italian foreign and domestic intelligence agency will use graphite to target a limited number of mobile phones after necessary legal approval.

See also  Microsoft credits encrypthub, the hacker behind the 618+ violation to disclose window defects

Copasir added that SPYware was used to search for fugitives, illegal immigration, suspected terrorism, organized crime, fuel smuggling and anti-spinaging, and internal security activities. However, although he said that no phones belonging to Cancerato were among the victims, he left an important question as to who targeted the journalists to unresponsives.

However, this report sheds light on how Paragon’s spyware infrastructure works in the background. He said that operators must sign in with their username and password to use graphite. Each spyware deployment is located on a customer-controlled server and generates detailed logs that Paragon cannot access.

“The lack of accountability available to these spyware targets underscores the extent to which European journalists continue to be exposed to this highly invasive digital threat, highlighting the dangers of spyware spread and abuse,” the Civic Research Institute said.

The European Union has previously raised concerns over the unidentified use of commercial spyware, calling for stronger export controls and legal protection measures. These recent cases could intensify regulatory reform pressures at both the national and EU levels.

Apple’s threat notification system is based on internal threat intelligence and may not be able to detect all instances of targeting. The company noted that such warnings do not confirm active infections, but indicates that abnormal activity has been observed consistent with targeted attacks.

The return of the predator

The latest revelation occurred in which a recorded Future Insikt group stated that a “revival” of predator-related activity was observed several months after the US government approved by several individuals linked to Israeli spyware vendor Intelexa/Cytrox.

See also  US Sanctions Funnull is a $200 million romance bait scam linked to Crypto scam

This includes identifying a new victim Tier 1 server, a previously unknown customer in Mozambique, and its relationship with Foxitech Sro with Predator Infrastructure, a Czech entity previously associated with the Intelexa Consortium.

The return of the predator

For the past two years, predator operators have flagged more than 12 counties, including Angola, Armenia, Botswana, the Democratic Republic of the Congo, Egypt, Indonesia, Kazakhstan, Mongolia, Mozambique, Oman, the Philippines, Saudi Arabia, Trinidad and Trinidad.

“This is in line with the broader observation that predators are very active in Africa and that more than half of the identified clients are located on the continent,” the company said.

“This could reflect an increasing demand for spyware tools, continued innovation in response to public reporting and enhanced security, and an increasingly complex corporate structure designed to prevent sanctions and attribution, particularly in countries facing export restrictions.”

Share This Article
Leave a comment