{
	"id": "f53b416d-0813-4fbc-be7c-44bb4b27ff93",
	"created_at": "2026-04-06T00:13:42.991324Z",
	"updated_at": "2026-04-10T13:12:27.093941Z",
	"deleted_at": null,
	"sha1_hash": "93ad347087a2178cf0f92f742a823e5dad885b19",
	"title": "Apple sues NSO Group to curb the abuse of state-sponsored spyware",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 48932,
	"plain_text": "Apple sues NSO Group to curb the abuse of state-sponsored\r\nspyware\r\nPublished: 2021-11-23 · Archived: 2026-04-05 18:54:58 UTC\r\nopens in new window\r\nPRESS RELEASE November 23, 2021\r\nApple sues NSO Group to curb the abuse of state-sponsored spyware\r\nApple also announced a $10 million contribution to support cybersurveillance researchers and advocates\r\nCUPERTINO, CALIFORNIA Apple today filed a lawsuit against NSO Group and its parent company to hold it\r\naccountable for the surveillance and targeting of Apple users. The complaint provides new information on how\r\nNSO Group infected victims’ devices with its Pegasus spyware. To prevent further abuse and harm to its users,\r\nApple is also seeking a permanent injunction to ban NSO Group from using any Apple software, services, or\r\ndevices.\r\nNSO Group creates sophisticated, state-sponsored surveillance technology that allows its highly targeted spyware\r\nto surveil its victims. These attacks are only aimed at a very small number of users, and they impact people across\r\nmultiple platforms, including iOS and Android. Researchers and journalists have publicly documented a history of\r\nthis spyware being abused to target journalists, activists, dissidents, academics, and government officials.1\r\n“State-sponsored actors like the NSO Group spend millions of dollars on sophisticated surveillance technologies\r\nwithout effective accountability. That needs to change,” said Craig Federighi, Apple’s senior vice president of\r\nSoftware Engineering. “Apple devices are the most secure consumer hardware on the market — but private\r\ncompanies developing state-sponsored spyware have become even more dangerous. While these cybersecurity\r\nthreats only impact a very small number of our customers, we take any attack on our users very seriously, and\r\nwe’re constantly working to strengthen the security and privacy protections in iOS to keep all our users safe.”\r\nNSO Group’s FORCEDENTRY Exploit\r\nApple’s legal complaint provides new information on NSO Group’s FORCEDENTRY, an exploit for a now-patched vulnerability previously used to break into a victim’s Apple device and install the latest version of NSO\r\nGroup’s spyware product, Pegasus. The exploit was originally identified by the Citizen Lab, a research group at\r\nthe University of Toronto.\r\nThe spyware was used to attack a small number of Apple users worldwide with dangerous malware and spyware.\r\nApple’s lawsuit seeks to ban NSO Group from further harming individuals by using Apple’s products and\r\nservices. The lawsuit also seeks redress for NSO Group’s flagrant violations of US federal and state law, arising\r\nout of its efforts to target and attack Apple and its users.\r\nNSO Group and its clients devote the immense resources and capabilities of nation-states to conduct highly\r\ntargeted cyberattacks, allowing them to access the microphone, camera, and other sensitive data on Apple and\r\nAndroid devices. To deliver FORCEDENTRY to Apple devices, attackers created Apple IDs to send malicious\r\ndata to a victim’s device — allowing NSO Group or its clients to deliver and install Pegasus spyware without a\r\nhttps://www.apple.com/newsroom/2021/11/apple-sues-nso-group-to-curb-the-abuse-of-state-sponsored-spyware/\r\nPage 1 of 3\n\nvictim’s knowledge. Though misused to deliver FORCEDENTRY, Apple servers were not hacked or compromised\r\nin the attacks.\r\nApple makes the most secure mobile devices on the market, and constantly invests in strengthening privacy and\r\nsecurity protections for its users. For example, researchers have found that other mobile platforms have 15 times\r\nmore malware infections than iPhone,2 and a recent study showed that less than 2 percent of mobile malware\r\ntargets iOS devices.3\r\niOS 15 includes a number of new security protections, including significant upgrades to the BlastDoor security\r\nmechanism. While NSO Group spyware continues to evolve, Apple has not observed any evidence of successful\r\nremote attacks against devices running iOS 15 and later versions. Apple urges all users to update their iPhone and\r\nalways use the latest software.\r\n“At Apple, we are always working to defend our users against even the most complex cyberattacks. The steps\r\nwe’re taking today will send a clear message: In a free society, it is unacceptable to weaponize powerful state-sponsored spyware against those who seek to make the world a better place,” said Ivan Krstić, head of Apple\r\nSecurity Engineering and Architecture. “Our threat intelligence and engineering teams work around the clock to\r\nanalyze new threats, rapidly patch vulnerabilities, and develop industry-leading new protections in our software\r\nand silicon. Apple runs one of the most sophisticated security engineering operations in the world, and we will\r\ncontinue to work tirelessly to protect our users from abusive state-sponsored actors like NSO Group.”\r\nApple’s Continuing Efforts to Protect Its Users\r\nApple commends groups like the Citizen Lab and Amnesty Tech for their groundbreaking work to identify\r\ncybersurveillance abuses and help protect victims. To further strengthen efforts like these, Apple will be\r\ncontributing $10 million, as well as any damages from the lawsuit, to organizations pursuing cybersurveillance\r\nresearch and advocacy.\r\nApple will also support the accomplished researchers at the Citizen Lab with pro-bono technical, threat\r\nintelligence, and engineering assistance to aid their independent research mission, and where appropriate, will\r\noffer the same assistance to other organizations doing critical work in this space.\r\n“Mercenary spyware firms like NSO Group have facilitated some of the world’s worst human rights abuses and\r\nacts of transnational repression, while enriching themselves and their investors,” said Ron Deibert, director of the\r\nCitizen Lab at the University of Toronto. “I applaud Apple for holding them accountable for their abuses, and\r\nhope in doing so Apple will help to bring justice to all who have been victimized by NSO Group’s reckless\r\nbehavior.”\r\nApple is notifying the small number of users that it discovered may have been targeted by FORCEDENTRY. Any\r\ntime Apple discovers activity consistent with a state-sponsored spyware attack, Apple will notify the affected users\r\nin accordance with industry best practices.\r\nApple believes privacy is a fundamental human right, and security is a constant focus for teams across the\r\ncompany. For years, Apple has led the industry with new protections to disrupt sophisticated attacks and defend its\r\nusers, including features such as pointer authentication codes (PAC), BlastDoor, and the Page Protection Layer\r\n(PPL). For more information about Apple’s platform security, visit\r\nsupport.apple.com/guide/security/welcome/web.\r\n1. Citizen Lab, “NSO Group iMessage Zero-Click Exploit Captured in the Wild,” Sept. 13, 2021.\r\n2. Nokia, “Threat Intelligence Report 2020,” 2020.\r\nhttps://www.apple.com/newsroom/2021/11/apple-sues-nso-group-to-curb-the-abuse-of-state-sponsored-spyware/\r\nPage 2 of 3\n\n3. PurpleSec, “2021 Cyber Security Statistics: The Ultimate List Of Stats, Data \u0026 Trends,” 2021.\r\n \r\nSource: https://www.apple.com/newsroom/2021/11/apple-sues-nso-group-to-curb-the-abuse-of-state-sponsored-spyware/\r\nhttps://www.apple.com/newsroom/2021/11/apple-sues-nso-group-to-curb-the-abuse-of-state-sponsored-spyware/\r\nPage 3 of 3",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://www.apple.com/newsroom/2021/11/apple-sues-nso-group-to-curb-the-abuse-of-state-sponsored-spyware/"
	],
	"report_names": [
		"apple-sues-nso-group-to-curb-the-abuse-of-state-sponsored-spyware"
	],
	"threat_actors": [
		{
			"id": "9de1979b-40fc-44dc-855d-193edda4f3b8",
			"created_at": "2025-08-07T02:03:24.92723Z",
			"updated_at": "2026-04-10T02:00:03.755516Z",
			"deleted_at": null,
			"main_name": "GOLD LOCUST",
			"aliases": [
				"Anunak",
				"Carbanak",
				"Carbon Spider ",
				"FIN7 ",
				"Silicon "
			],
			"source_name": "Secureworks:GOLD LOCUST",
			"tools": [
				"Carbanak"
			],
			"source_id": "Secureworks",
			"reports": null
		},
		{
			"id": "cfdd35af-bd12-4c03-8737-08fca638346d",
			"created_at": "2022-10-25T16:07:24.165595Z",
			"updated_at": "2026-04-10T02:00:04.887031Z",
			"deleted_at": null,
			"main_name": "Sea Turtle",
			"aliases": [
				"Cosmic Wolf",
				"Marbled Dust",
				"Silicon",
				"Teal Kurma",
				"UNC1326"
			],
			"source_name": "ETDA:Sea Turtle",
			"tools": [
				"Drupalgeddon"
			],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "aa73cd6a-868c-4ae4-a5b2-7cb2c5ad1e9d",
			"created_at": "2022-10-25T16:07:24.139848Z",
			"updated_at": "2026-04-10T02:00:04.878798Z",
			"deleted_at": null,
			"main_name": "Safe",
			"aliases": [],
			"source_name": "ETDA:Safe",
			"tools": [
				"DebugView",
				"LZ77",
				"OpenDoc",
				"SafeDisk",
				"TypeConfig",
				"UPXShell",
				"UsbDoc",
				"UsbExe"
			],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "33ae2a40-02cd-4dba-8461-d0a50e75578b",
			"created_at": "2023-01-06T13:46:38.947314Z",
			"updated_at": "2026-04-10T02:00:03.155091Z",
			"deleted_at": null,
			"main_name": "Sea Turtle",
			"aliases": [
				"UNC1326",
				"COSMIC WOLF",
				"Marbled Dust",
				"SILICON",
				"Teal Kurma"
			],
			"source_name": "MISPGALAXY:Sea Turtle",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "62b1b01f-168d-42db-afa1-29d794abc25f",
			"created_at": "2025-04-23T02:00:55.22426Z",
			"updated_at": "2026-04-10T02:00:05.358041Z",
			"deleted_at": null,
			"main_name": "Sea Turtle",
			"aliases": [
				"Sea Turtle",
				"Teal Kurma",
				"Marbled Dust",
				"Cosmic Wolf",
				"SILICON"
			],
			"source_name": "MITRE:Sea Turtle",
			"tools": [
				"SnappyTCP"
			],
			"source_id": "MITRE",
			"reports": null
		}
	],
	"ts_created_at": 1775434422,
	"ts_updated_at": 1775826747,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/93ad347087a2178cf0f92f742a823e5dad885b19.pdf",
		"text": "https://archive.orkl.eu/93ad347087a2178cf0f92f742a823e5dad885b19.txt",
		"img": "https://archive.orkl.eu/93ad347087a2178cf0f92f742a823e5dad885b19.jpg"
	}
}