On Monday, Apple issued notifications to Indian opposition leaders and numerous other individuals, warning them of potential security threats posed by “state-sponsored attackers” attempting to breach their iPhones, as reported by HT.
These notifications arrive one year after a committee of experts appointed by the Supreme Court conducted an analysis of 29 phones, yielding inconclusive evidence regarding the existence of Pegasus spyware.
How do Apple notifications operate?
The functioning of Apple notifications is as follows:
According to the report, Apple sends emails and iMessages to the user’s Apple ID-associated email address and phone number. Furthermore, when a user logs into applied.apple.com, a prominent “Threat Notification” banner appears at the top of the page. This banner not only displays the date of the email and iMessage notifications sent, but it also serves as a valuable verification tool for users to confirm the legitimacy of the received messages.
How does Apple identify and detect security threats?
Apple’s method for detecting attacks appears to rely on the reception and utilization of threat intelligence signals. Apple has consistently chosen not to divulge specific details about the detection methods, expressing concerns that sharing such information might aid potential attackers in adjusting their tactics to evade future detection.
Who might find themselves at risk of being targeted?
As mentioned in the HT report, Apple recognizes that the vast majority of individuals are unlikely to be the primary targets of state-sponsored actors, given that such attacks typically require substantial financial resources, physical infrastructure, and personnel. Potential targets may encompass politicians, human rights advocates, journalists, as well as vocal and influential government critics.
Read more on: Apple iPhone Hacking Message, CERT: Before “Threat” Message, Centre’s “High Severity” Warning Against Apple (ndtv.com)