The thwarted attack on the human rights activist, Ahmed Mansoor, used a text message that invited him to click on a web link. Instead of clicking, he forwarded the message to researchers at the University of Toronto’s Citizen Lab. Experts at Citizen Lab worked with security company Lookout and determined that the link would have installed a program taking advantage of a three flaws that Apple and others were not aware of. Mansoor had previously been targeted with software from both of those companies, according to Citizen Lab. “I can’t think of a more compelling case of serial misuse of lawful intercept malware than the targeting of Mansoor,” said one of the Citizen Lab researchers, John Scott-Railton.
Source: Mint August 26, 2016 08:37 UTC