{"id":36907,"date":"2015-02-04T13:40:22","date_gmt":"2015-02-04T21:40:22","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=36907"},"modified":"2023-04-11T20:36:13","modified_gmt":"2023-04-12T03:36:13","slug":"hackers-target-ios-using-government-officials-and-journalists-in-pawn-storm-malware-attack","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/hackers-target-ios-using-government-officials-and-journalists-in-pawn-storm-malware-attack\/","title":{"rendered":"Hackers Target iOS-Using Government Officials and Journalists in Pawn Storm Malware Attack"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-36910\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/02\/ps-600x300.jpeg\" alt=\"Pawn Storm\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/02\/ps-600x300.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/02\/ps-600x300-150x75.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/02\/ps-600x300-300x150.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>Last October, security researchers released\u00a0detailed reports about how a criminal hacking gang, possibly backed by a foreign state, was targeting Western governments, military and the media in an operation called &#8220;<a title=\"Operation Pawn Storm Targets Outlook Users\" href=\"https:\/\/web.archive.org\/web\/20160528195813\/http:\/\/www.tomsguide.com\/us\/operation-pawn-storm-outlook,news-19824.html\" target=\"_blank\" rel=\"nofollow noopener\">Pawn Storm<\/a>.&#8221;<\/p>\n<p>The hackers&#8217; aim, it was claimed, was to steal information and compromise the Windows computers of targets. And, when you consider that there has been strong speculation that the attack might be being sponsored by the Russian authorities, the list of targets begins to make sense.<\/p>\n<p>Through boobytrapped website attacks\u2014which would silently exploit vulnerabilities and install malware\u2014the hackers ingeniously only hacked likely targets by testing details of the visiting computer (operating system version, language settings, time zone, etc) before attempting infection.<\/p>\n<p>These infections, you will note, were against Windows computers. So, why are we talking about it on the Intego Mac Security blog?<\/p>\n<p>Well, <a title=\"Spyware aimed at Western governments, journalists hits iOS devices\" href=\"https:\/\/arstechnica.com\/information-technology\/2015\/02\/spyware-aimed-at-western-governments-journalists-hits-ios-devices\/\" target=\"_blank\" rel=\"nofollow noopener\">further research<\/a>\u00a0has revealed that the Pawn Storm spyware campaign is now also targeting iPhones and iPads.<\/p>\n<p>According to researchers, once a high profile target&#8217;s Windows computer has been successfully infected, the attackers &#8220;move their next pawn forward&#8221; and attempt to install iOS malware.<\/p>\n<p>The important thing to note at this point is that targeted iPhones and iPads <strong>do not have to be jailbroken<\/strong>, to be at risk of having the malware installed onto them.<\/p>\n<p>Instead, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/social-engineering\/\">social engineering<\/a> is used to trick the user into installing a malicious app onto their iOS device using the <a title=\"Link to Apple documentation on Ad-hoc provisioning\" href=\"https:\/\/help.apple.com\/xcode\/mac\/current\/#\/dev7ccaf4d3c\" target=\"_blank\" rel=\"nofollow noopener\">ad-hoc provisioning<\/a> feature that Apple provides for developers who wish to get beta software to testers:<\/p>\n<blockquote><p>We have seen one instance wherein a lure involving XAgent simply says &#8220;Tap Here to Install the Application.&#8221; The app uses Apple\u2019s ad hoc provisioning, which is a standard distribution method of Apple for iOS App developers. Through ad hoc provisioning, the malware can be installed simply by clicking on a link, such as in the picture below. The link will lead to https:\/\/www.{BLOCKED}\/adhoc\/XAgent.plist, a service that installs applications wirelessly.<\/p><\/blockquote>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-36919\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/02\/ps-tap-to-install.jpeg\" alt=\"Tap to install\" width=\"600\" height=\"153\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/02\/ps-tap-to-install.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/02\/ps-tap-to-install-150x38.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/02\/ps-tap-to-install-300x76.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>It is also possible that malware could be installed onto iOS devices after they have been connected to a compromised Windows computer via a USB cable.<\/p>\n<p>Like Sednit, the malware found on Windows computers, the attacks against iOS devices appear to be designed to steal personal information\u2014accessing files, listening to conversations, taking screenshots, reading text messages, collecting information on what WiFi networks are connected to, etc, and exfiltrating data back to a command &amp; control server.<\/p>\n<p>Security researchers\u00a0report that after being installed on <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/ios-7\/\">iOS 7<\/a>, the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/xagent\/\">XAgent malware<\/a>, completely hides itself and runs in the background. If its process is killed, it restarts almost immediately.<\/p>\n<p>On <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/ios-8\/\">iOS 8<\/a>, however, its icon is not correctly hidden and it fails to restart properly. One has to wonder if this is because the malware seen so far was created before the release of iOS 8 in September 2014, and whether newer, more compatible versions are now being used in attacks.<\/p>\n<p>As always, if you feel that your organization may be at risk, be sure to remind your users to be on their guard against unusual communications, and to be extremely wary of any messages encouraging them to install apps onto their devices.<\/p>\n<p>Ensure that you are running up-to-date software on your gateways, and on your desktops and laptops, to reduce the chances of a hack being successful.<\/p>\n<h3>How can I learn more?<\/h3>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\" \/><\/a>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, including security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Twitter-logo-icon-64.png\" alt=\"Follow Intego on Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Facebook-logo-icon-64.png\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/YouTube-logo-icon-64.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Pinterest-logo-icon-64.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/LinkedIn-logo-icon-64.png\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Instagram-logo-icon-64.png\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It appears that the Pawn Storm spyware campaign is now also targeting iPhones and iPads&#8230; and they don&#8217;t have to be jailbroken.<\/p>\n","protected":false},"author":34,"featured_media":36916,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190,5],"tags":[69,86,1945,125,1948],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"It appears that the Pawn Storm spyware campaign is now also targeting iPhones and iPads... and they don&#039;t have to be jailbroken.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/hackers-target-ios-using-government-officials-and-journalists-in-pawn-storm-malware-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers Target iOS-Using Government Officials and Journalists in Pawn Storm Malware Attack - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"It appears that the Pawn Storm spyware campaign is now also targeting iPhones and iPads... and they don&#039;t have to be jailbroken.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/hackers-target-ios-using-government-officials-and-journalists-in-pawn-storm-malware-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-02-04T21:40:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-12T03:36:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/02\/ps-400x260.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Graham Cluley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/hackers-target-ios-using-government-officials-and-journalists-in-pawn-storm-malware-attack\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/02\/ps-400x260.jpeg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/02\/ps-400x260.jpeg\",\"width\":400,\"height\":260},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/hackers-target-ios-using-government-officials-and-journalists-in-pawn-storm-malware-attack\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/hackers-target-ios-using-government-officials-and-journalists-in-pawn-storm-malware-attack\/\",\"name\":\"Hackers Target iOS-Using Government Officials and Journalists in Pawn Storm Malware Attack - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/hackers-target-ios-using-government-officials-and-journalists-in-pawn-storm-malware-attack\/#primaryimage\"},\"datePublished\":\"2015-02-04T21:40:22+00:00\",\"dateModified\":\"2023-04-12T03:36:13+00:00\",\"description\":\"It appears that the Pawn Storm spyware campaign is now also targeting iPhones and iPads... and they don't have to be jailbroken.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/hackers-target-ios-using-government-officials-and-journalists-in-pawn-storm-malware-attack\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/hackers-target-ios-using-government-officials-and-journalists-in-pawn-storm-malware-attack\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/hackers-target-ios-using-government-officials-and-journalists-in-pawn-storm-malware-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackers Target iOS-Using Government Officials and Journalists in Pawn Storm Malware Attack\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/hackers-target-ios-using-government-officials-and-journalists-in-pawn-storm-malware-attack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/hackers-target-ios-using-government-officials-and-journalists-in-pawn-storm-malware-attack\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\"},\"headline\":\"Hackers Target iOS-Using Government Officials and Journalists in Pawn Storm Malware Attack\",\"datePublished\":\"2015-02-04T21:40:22+00:00\",\"dateModified\":\"2023-04-12T03:36:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/hackers-target-ios-using-government-officials-and-journalists-in-pawn-storm-malware-attack\/#webpage\"},\"wordCount\":652,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/hackers-target-ios-using-government-officials-and-journalists-in-pawn-storm-malware-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/02\/ps-400x260.jpeg\",\"keywords\":[\"iOS\",\"Malware\",\"Pawn Storm\",\"Spyware\",\"XAgent\"],\"articleSection\":[\"Malware\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/hackers-target-ios-using-government-officials-and-journalists-in-pawn-storm-malware-attack\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\",\"name\":\"Graham Cluley\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"caption\":\"Graham Cluley\"},\"description\":\"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \\\"10 Greatest Britons in IT History\\\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.\",\"sameAs\":[\"https:\/\/grahamcluley.com\/\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"It appears that the Pawn Storm spyware campaign is now also targeting iPhones and iPads... and they don't have to be jailbroken.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/hackers-target-ios-using-government-officials-and-journalists-in-pawn-storm-malware-attack\/","og_locale":"en_US","og_type":"article","og_title":"Hackers Target iOS-Using Government Officials and Journalists in Pawn Storm Malware Attack - The Mac Security Blog","og_description":"It appears that the Pawn Storm spyware campaign is now also targeting iPhones and iPads... and they don't have to be jailbroken.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/hackers-target-ios-using-government-officials-and-journalists-in-pawn-storm-malware-attack\/","og_site_name":"The Mac Security Blog","article_published_time":"2015-02-04T21:40:22+00:00","article_modified_time":"2023-04-12T03:36:13+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/02\/ps-400x260.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Graham Cluley","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/hackers-target-ios-using-government-officials-and-journalists-in-pawn-storm-malware-attack\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/02\/ps-400x260.jpeg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/02\/ps-400x260.jpeg","width":400,"height":260},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/hackers-target-ios-using-government-officials-and-journalists-in-pawn-storm-malware-attack\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/hackers-target-ios-using-government-officials-and-journalists-in-pawn-storm-malware-attack\/","name":"Hackers Target iOS-Using Government Officials and Journalists in Pawn Storm Malware Attack - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/hackers-target-ios-using-government-officials-and-journalists-in-pawn-storm-malware-attack\/#primaryimage"},"datePublished":"2015-02-04T21:40:22+00:00","dateModified":"2023-04-12T03:36:13+00:00","description":"It appears that the Pawn Storm spyware campaign is now also targeting iPhones and iPads... and they don't have to be jailbroken.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/hackers-target-ios-using-government-officials-and-journalists-in-pawn-storm-malware-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/hackers-target-ios-using-government-officials-and-journalists-in-pawn-storm-malware-attack\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/hackers-target-ios-using-government-officials-and-journalists-in-pawn-storm-malware-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Hackers Target iOS-Using Government Officials and Journalists in Pawn Storm Malware Attack"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/hackers-target-ios-using-government-officials-and-journalists-in-pawn-storm-malware-attack\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/hackers-target-ios-using-government-officials-and-journalists-in-pawn-storm-malware-attack\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2"},"headline":"Hackers Target iOS-Using Government Officials and Journalists in Pawn Storm Malware Attack","datePublished":"2015-02-04T21:40:22+00:00","dateModified":"2023-04-12T03:36:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/hackers-target-ios-using-government-officials-and-journalists-in-pawn-storm-malware-attack\/#webpage"},"wordCount":652,"commentCount":1,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/hackers-target-ios-using-government-officials-and-journalists-in-pawn-storm-malware-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/02\/ps-400x260.jpeg","keywords":["iOS","Malware","Pawn Storm","Spyware","XAgent"],"articleSection":["Malware","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/hackers-target-ios-using-government-officials-and-journalists-in-pawn-storm-malware-attack\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2","name":"Graham Cluley","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","caption":"Graham Cluley"},"description":"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \"10 Greatest Britons in IT History\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.","sameAs":["https:\/\/grahamcluley.com\/"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/02\/ps-400x260.jpeg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-9Bh","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/36907"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=36907"}],"version-history":[{"count":14,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/36907\/revisions"}],"predecessor-version":[{"id":97712,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/36907\/revisions\/97712"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/36916"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=36907"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=36907"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=36907"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}