Skip to content

NSO’s zero-click ForcedEntry exploit used GIFs to hack iMessage

  • by
  • 3 min read

A few months after Citizen Labs outed NSO group’s ForcedEntry exploit targetting iMessage users, Ian Beer and Samuel Groß of Google Project Zero have posted a detailed technical analysis of how the exploit works. 

The researchers collaborated with Apple’s Security Engineering and Architecture (SEAR) group and obtained the ForcedEntry exploit samples from Citizen Labs. The exploit has been labelled “one of the most technically sophisticated exploits” they’ve ever seen. 

The exploit is described as a “zero-click” exploit, meaning it doesn’t require interaction with the user. Apple also recently ramped up their security by launching a new feature that informs users if an exploit is targeting them and in addition to suing NSO and its parent company OSY Technologies back in November. Additionally, the US placed NSO on a trade blocklist in the same month.

In the News: Log4j turns out to be far more dangerous; CISA orders fixing

An unpleasant surprise

The exploit clearly shows that NSO has capabilities previously thought to be in control of only a few nation-states. NSO’s Pegasus software has been known to target human rights activists and journalists on a pretty alarming scale. 

The two-part blog post covering the technical analysis also notes that while these exploits previously worked on a one-tap basis, they’ve now shifted to a zero-click basis which means even the most tech-savvy targets don’t know if they’re being targeted as the exploit works quietly in the background. 

Besides not using a digital device at all, there’s no way to prevent being exploited by such attacks, with the researchers adding that ” it’s a weapon against which there is no defence.”

The entry point here is iMessage. The app has native support for GIF images — short, compressed animated images popular in the meme culture. However, the library that parses these images, ImageIO, which guesses the correct format of the source file and parses it while ignoring the file extension, is flawed, meaning NSO could sneak in an exploit masked as GIF images. 

The entry point for the exploit was GIFs in iMessage.

Essentially, Pegasus hides a PDF containing the malicious exploit code inside of these GIF files, which then works by taking advantage of an integer overflow vulnerability in CoreGraphics, the image parsing library used by Apple. 

Apple has fixed the vulnerability, tracked as CVE code CVE-2021-30860 in iOS 14.8 on September 13 this year. Moreover, the iPhone maker reported to the Project Zero researchers that they’d restricted the formats parsed by ImageIO starting from iOS 14.8.1 issued on October 26 and completely removed the GIF code path with decoding taking place in the BlastDoor sandbox starting iOS 15.0 rolled out on September 20 this year. 

The researchers also stated that while their exploit works only on iMessage and hence, Apple devices, they’re aware of similar exploits existing for Android devices. However, they don’t yet have an existing sample.

In the News: Oppo Find N foldable flagship unveiled: Price, specs and release date

Yadullah Abidi

Yadullah Abidi

Yadullah is a Computer Science graduate who writes/edits/shoots/codes all things cybersecurity, gaming, and tech hardware. When he's not, he streams himself racing virtual cars. He's been writing and reporting on tech and cybersecurity with websites like Candid.Technology and MakeUseOf since 2018. You can contact him here: