{"id":829,"date":"2016-08-26T10:53:53","date_gmt":"2016-08-26T02:53:53","guid":{"rendered":"https:\/\/tongwing.woon.sg\/blog\/?p=829"},"modified":"2016-08-30T15:02:32","modified_gmt":"2016-08-30T07:02:32","slug":"the-million-dollar-dissident-nso-groups-iphone-zero-days-used-against-a-uae-human-rights-defender-the-citizen-lab","status":"publish","type":"post","link":"https:\/\/tongwing.woon.sg\/blog\/the-million-dollar-dissident-nso-groups-iphone-zero-days-used-against-a-uae-human-rights-defender-the-citizen-lab\/","title":{"rendered":"The Million Dollar Dissident: NSO Group&#8217;s iPhone Zero-Days used against a UAE Human Rights Defender &#8211; The Citizen Lab"},"content":{"rendered":"<p>The dark side of the cybersecurity industry has surfaced once again &#8211; companies that provide cyberweapons to organizations with deep pockets. In this case, the cyberweapon is a chain of zero-day exploits that requires no more than clicking on a link from an SMS. Good thing the target is discerning enough not to click on it &#8211; which means <a href=\"https:\/\/www.zerodium.com\/ios9.html\">a million dollars<\/a> (or two, or three) is wasted.<\/p>\n<p><a href=\"https:\/\/citizenlab.org\/2016\/08\/million-dollar-dissident-iphone-zero-day-nso-group-uae\/\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/citizenlab.org\/wp-content\/uploads\/2016\/08\/image00.jpg\" width=\"816\" height=\"750\" class=\"alignnone\" \/><\/a><\/p>\n<blockquote><p>This report describes how a government targeted an internationally recognized human rights defender, Ahmed Mansoor, with the Trident, a chain of zero-day exploits designed to infect his iPhone with sophisticated commercial spyware.<\/p><\/blockquote>\n<p>Source: <em><a href=\"https:\/\/citizenlab.org\/2016\/08\/million-dollar-dissident-iphone-zero-day-nso-group-uae\/\">The Million Dollar Dissident: NSO Group&#8217;s iPhone Zero-Days used against a UAE Human Rights Defender &#8211; The Citizen Lab<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The dark side of the cybersecurity industry has surfaced once again &#8211; companies that provide cyberweapons to organizations with deep pockets. In this case, the cyberweapon is a chain of zero-day exploits that requires no more than clicking on a link from an SMS. Good thing the target is discerning enough not to click on [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"_links":{"self":[{"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/posts\/829"}],"collection":[{"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/comments?post=829"}],"version-history":[{"count":4,"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/posts\/829\/revisions"}],"predecessor-version":[{"id":835,"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/posts\/829\/revisions\/835"}],"wp:attachment":[{"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/media?parent=829"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/categories?post=829"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/tags?post=829"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}