Close Menu
    Facebook X (Twitter) Instagram
    Sunday, November 9
    Facebook X (Twitter) Instagram
    SecurNerd
    • Home
    • General News
    • Cyber Attacks
    • Threats
    • Vulnerabilities
    • Cybersecurity
    • Contact Us
    • More
      • About US
      • Disclaimer
      • Privacy Policy
      • Terms and Conditions
    SecurNerd
    Home»Vulnerabilities»Apple’s Recent Vulnerabilities Exploited to Attack Ex-Egyptian MP using “Predator” Malware
    Vulnerabilities

    Apple’s Recent Vulnerabilities Exploited to Attack Ex-Egyptian MP using “Predator” Malware

    securnerdBy securnerdSeptember 23, 2023No Comments3 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email

    On September 21, 2023, Apple confronted three newly identified vulnerabilities. These vulnerabilities were a part of a complex exploit chain targeting Ahmed Eltantawy, a former Egyptian MP, using a malicious software dubbed “Predator” from May to September 2023.

    Following Eltantawy’s public announcement of his intent to run for the Egyptian Presidential election in 2024, he became a target. The Citizen Lab attributes the cyberattack to the Egyptian government, with substantial evidence pointing to them being a regular patron of this particular surveillance tool.

    A collaborative investigation by Canada’s Citizen Lab and Google’s Threat Analysis Group (TAG) revealed that this invasive software was being shared via links in SMS and WhatsApp messages.

    During the months of August and September 2023, Eltantawy’s mobile service with Vodafone Egypt seemed to be under continuous cyberattacks. His visits to non-HTTPS websites resulted in auto-redirections by a system within Vodafone Egypt’s network infrastructure. This redirection took him to a harmful site set to install the Predator malware developed by Cytrox.

    The exploitation took advantage of three vulnerabilities: CVE-2023-41991, CVE-2023-41992, and CVE-2023-41993. These vulnerabilities, when combined, could enable an attacker to bypass security measures, escalate system permissions, and remotely control the compromised device.

    Cytrox’s Predator shares many functionalities with NSO Group’s infamous Pegasus software. It allows extensive surveillance and unauthorized data extraction from victimized devices. Due to its association with human rights violations, Predator, a product of the Intellexa Alliance, was blacklisted by the U.S. government in July 2023.

    Eluding the basic details, an intricate network strategy was used to direct Eltantawy to a malicious site using Sandvine’s PacketLogic technology. The method involved the combination of genuine and deceptive content, which eventually led to the downloading of the Predator software.

    Maddie Stone from Google TAG described this approach as an adversary-in-the-middle (AitM) attack. This technique uses unsecured HTTP websites to stealthily direct the victim to a different, attacker-controlled site.

    In 2021 and 2023, Eltantawy was also targeted with deceptive SMS and WhatsApp messages, seemingly alerting him to suspicious activity on his accounts. Interestingly, one of the messages was linked to the aforementioned malware within mere minutes of being viewed.

    Furthermore, Google TAG discovered that the Predator software also had a version targeting Android devices. This variant exploited another vulnerability, CVE-2023-4762, within Google Chrome’s browser.

    This specific flaw, which pertains to Google Chrome’s V8 engine, was reported on August 16, 2023, and Google addressed it by September 5, 2023. There are indications that Cytrox/Intellexa could have been utilizing this as an undisclosed vulnerability.

    Recent revelations about these cyberattacks emphasize the severe risks in the telecommunications sector, with certain aspects being misused to siphon data or deploy malware onto unsuspecting users’ devices.

    The Citizen Lab advised users to be wary of non-HTTPS websites, given that a single visit to such sites can result in a malware infection. They also recommended individuals who might be at a higher risk of cyberattacks to regularly update their devices and use security features like Lockdown Mode for added protection.

    Found this news interesting? Follow us on Twitter  and Telegram to read more exclusive content we post.

    Post Views: 54
    Featured
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleEthos Technologies Data Breach $1M Settlement: Claim Up To $5,200 If You Were Affected
    Next Article Ethos Technologies Data Breach Settlement Offers Compensation of Up to $5,200 for Affected Individuals
    securnerd
    • Website
    • Facebook
    • X (Twitter)
    • Instagram

    We're your premier source for the latest in AI, cybersecurity, science, and technology. Dedicated to providing clear, thorough, and accurate information, our team brings you insights into the innovations that shape tomorrow. Let's navigate the future together."

    Related Posts

    Python June 23, 2024

    PyQt Mastery: From Beginner to Advanced

    June 23, 2024
    AI June 9, 2024

    Learn AI by yourself! Recommended AI study and learning methods that beginners won’t be discouraged by!

    June 9, 2024
    AI June 7, 2024

    Foundation Models: The Heart of Generative AI

    June 7, 2024
    Add A Comment
    Leave A Reply Cancel Reply

    Join the Community
    Recent Post

    Complete HTML Handwritten Notes

    July 22, 2024

    Complete C++ Handwritten Notes From Basic to Advanced

    July 21, 2024

    Complete Python Ebook From Basic To Advanced

    July 20, 2024

    Top 7 Open-Source LLMs for 2024 and Their Uses

    July 18, 2024
    About Us
    About Us

    We're your premier source for the latest in AI, cybersecurity, science, and technology. Dedicated to providing clear, thorough, and accurate information, our team brings you insights into the innovations that shape tomorrow. Let's navigate the future together."

    Latest

    Complete HTML Handwritten Notes

    July 22, 2024

    Complete C++ Handwritten Notes From Basic to Advanced

    July 21, 2024

    Complete Python Ebook From Basic To Advanced

    July 20, 2024
    Popular Post

    Ukraine Enhances Wartime Efforts Through Advanced Cyber Intelligence Strategies

    August 10, 20235 Views

    A Mild, Sweet Fruit With a Fibrous Center

    September 6, 20230 Views

    Top Men’s Fashion Trends From Spring

    September 6, 20230 Views

    Spicy Crispy Chicken Burger Recipe

    September 6, 20230 Views

    Ethos Technologies Data Breach Settlement Offers Compensation of Up to $5,200 for Affected Individuals

    September 23, 20236 Views

    New Sophisticated and Modular ‘Deadglyph’ Malware Unleashed in Government Cyberattacks

    September 24, 20234 Views

    Ukrainian Authorities Detect Russian Hacker Campaign Seeking Evidence of War Crimes

    September 25, 20232 Views

    Zyxel Addresses 15 Security Vulnerabilities Across NAS, Firewall, and AP Devices with Latest Patches

    December 1, 20231 Views

    Debian Project Launches Debian 12.1 “Bookworm” Featuring 89 Bug Remediations and 26 Security Enhancements

    July 24, 202310 Views

    Microsoft Edge Deepens Dark Mode Experience with Enhanced Theme

    July 31, 202312 Views
    Facebook X (Twitter) Instagram Pinterest
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.