Journalist iPhone hacked by NSO

Journalist iPhone hacked by NSO Pegasus

Wednesday 9 March, 2022

The smartphone security versus the hacker battle continues, with the announcement that another journalist has been the target of another NSO Pegasus malware attack. 

Why was the journalist targeted?

The person involved in the malware attack was a New York Times journalist that had been covering stories across the Middle East. The NSO Pegasus software used against him is only sold to government states, therefore it is suspected that Saudi Arabia was the instigator, although this has yet to be proved. 

As the journalist was known to have made contacts across the region that hold views opposed to the government, it is thought they were attempting to discover their identities. The journalist feared for the safety of the contacts, as he thought they would be at risk of being placed in jail or even death, so naturally the security of the information he held was vital.

What is Zero Click Spyware?

There were an alleged four attacks between 2020 and 2021, two of which were an attempt to have the user click on a WhatsApp message, which naturally he didn’t do. The other two were a zero click attack, meaning the journalist didn’t have to interact with the phone at all, leading to the iPhone being infected. 

Zero Click Malware is a malicious hack that needs no action from the user at all to activate the software. Unlike the attempts made via WhatsApp, this did not require a file or link to be opened or clicked. 

How to protect yourself from Zero Click spyware

In this case, the journalist has chosen to take extreme measures to protect the information he holds and how he stores it. For some cases he has been dealing with he has chosen to store nothing electronically on his phone. 

This type of action would not always be a workable option for others, so they would need to address the issue in other ways.

This is why many business and private individuals have switched to using the military grade smartphone security that the Blackphone PRIVY 2.0 delivers. 

The protection provided by the Blackphone PRIVY 2.0 includes:

  • A Zero Attack Surface – This feature removes the common vulnerabilities such as GSM services, SMS services, Google apps and services.
  • End-To-End Encryption – All communications are protected by end-to-end encryption and are only transmitted over an encrypted network. 
  • Verified Boot – On every boot start-up, the device fingerprint is authenticated against a server-side copy to ensure the legitimacy of the OS. 
  • Encrypted Storage – The Blackphone PRIVY’s built-in storage is encrypted and protected using a highly complex password making it unbreakable, even for supercomputers.

For those who’s employment or personal standing require their information to be secured, the Blackphone PRIVY 2.0 delivers all the protection needed.

Please complete the enquiry form or give one of our team a call if you would like to discover how the Blackphone PRIVY 2.0 can be part of your communication security. 

Related Articles:

The Latest in Mobile Security & Encryption...

Using and Android phone? Watch out for a “Dirty Pipe” exploit!

Thursday 12 May, 2022

Dirty Pipe exploit affects the likes of Google’s Pixel 6 and the Samsung Galaxy S22 mobile phones, along with those using Android 12 OS.

How do I turn off Siri?

Thursday 12 May, 2022

There is a growing number of people that are looking at how they can turn off Siri over concerns for their security and privacy.

Secure Dual OS - The best of both worlds

Tuesday 3 May, 2022

Mobile phone privacy has just taken another important step forward with the introduction of the Blackphone PRIVY 2.0’s Secure Dual OS.


Looking to buy the new Blackphone PRIVY 2.0? Please buy online here

Buy Blackphone PRIVY 2.0

If you would like more information on the Blackphone PRIVY 2.0 please complete this form and our sales team will be in touch.