Israeli Firm Using Spyware to Infect iPhones Via Calendar Invites

An Israeli surveillance company has been found infecting iPhones with spyware, possibly by exploiting Apple’s iCloud calendar invitation system. 

The findings come from Microsoft and watchdog group Citizen Lab, which investigated spyware samples that allegedly come from Israel-based QuaDream. The spyware, dubbed “EndofDays,” was used back in 2021, and leveraged a “zero-click” exploit—or an attack that can hijack an iPhone without requiring the user to click on anything. 

Once it infects, EndofDays can record audio from phone calls, secretly take pictures, and search through the device for files, among other capabilities, including a self-destruct function that can wipe traces of the spyware.  

The self-erasing abilities make it difficult to understand the full scope of the attack. But in its report(Opens in a new window), Citizen Lab uncovered evidence that QuaDream was likely using “invisible iCloud calendar invitations sent from the spyware’s operator to victims” in order to deliver the attack. 

The spyware samples themselves contain an ability to delete events from the iOS calendar associated with a specific email address. Citizen Lab also examined the iPhones belonging to two victims of the spyware that showed traces of tampering through calendar invite ICS files. 

“We suspect that the attacker’s use of closing and opening CDATA tags in the .ics could potentially facilitate the inclusion of additional XML data that would be processed by the user’s phone, in order to trigger some behaviour desired by the attacker,” Citizen Lab said. 

Hence, it’s possible the spyware arrived through emails carrying the malicious calendar invites. Citizen Lab researcher Bill Marczak also notes the malicious calendar invites were for events logged in the past, which stopped iCloud from automatically notifying users about the invites. However, researchers were unable to recover any XML data from the ICS files. 

Citizen Lab’s report goes on to say EndofDays infected at least five victims including journalists, political opposition figures, and an NGO worker. The victims were based in North America, Central Asia, Southeast Asia, Europe, and the Middle East. 

Although Apple appears to have patched the spyware exploit in 2021 through various software updates, Microsoft says(Opens in a new window) it’s “highly likely” QuaDream has updated their tactics to hijack iPhones on the latest versions of iOS.  

Recommended by Our Editors

QuaDream maintains a shadowy presence; the company has no public website or social media accounts. But according(Opens in a new window) to Reuters, QuaDream has sold its spyware technologies to law enforcement clients in Mexico, Saudi Arabia, and Singapore. 

Citizen Lab also published evidence showing that QuaDream maintains servers in 10 countries to exfiltrate data from devices infected with the company’s spyware, including the Czech Republic, Mexico, Romania, Ghana, and the United Arab Emirates. 

“Ultimately, this report is a reminder that the industry for mercenary spyware is larger than any one company, and that continued vigilance is required by researchers and potential targets alike,” Citizen Lab added. 

Apple didn’t immediately respond to a request for comment.

SecurityWatch newsletter for our top privacy and security stories delivered right to your inbox.”,”first_published_at”:”2021-09-30T21:22:09.000000Z”,”published_at”:”2022-03-24T14:57:33.000000Z”,”last_published_at”:”2022-03-24T14:57:28.000000Z”,”created_at”:null,”updated_at”:”2022-03-24T14:57:33.000000Z”})” x-show=”showEmailSignUp()” class=”rounded bg-gray-lightest text-center md:px-32 md:py-8 p-4 mt-8 container-xs” readability=”31.423799582463″>

Like What You’re Reading?

Sign up for SecurityWatch newsletter for our top privacy and security stories delivered right to your inbox.

This newsletter may contain advertising, deals, or affiliate links. Subscribing to a newsletter indicates your consent to our Terms of Use and Privacy Policy. You may unsubscribe from the newsletters at any time.

Facebook Comments Box

Hits: 0