Tue, 21-Oct-2025

Google Ads | Google Ads | Google Ads | Google Ads | Google Ads | Google Ads | Google Ads | Google Ads

Govt warns of hackers targeting iPhone users in Pakistan

Govt warns of hackers targeting iPhone users in Pakistan

Govt warns of hackers targeting iPhone users in Pakistan

  • Apple iPhone users in Pakistan are being targeted with Pegasus spyware using the Blast Pass exploit.
  • The Blast Pass malware infects iOS without user interaction.
  • Apple has issued a security advisory for iPhone users and encouraged them to follow the safety measures.

The Cabinet Division has issued a Cyber Security Advisory, warning that Apple iPhones in Pakistan have been targeted using the Blast Pass Exploit to deploy the Pegasus spyware.

According to the advisory, it has been reported that NSO Group’s malicious spyware, Pegasus, is targeting Apple iPhone users. The exploitation is initiated through the iMessage feature using CVE-2023-41061 and CVE-2023-41064 for deploying Blast Pass (zero-day and zero-click malware).

Blast Pass Exploit

Blast Pass can infect the latest OS versions (16.6) without requiring any user interaction. In response, Apple has issued a security advisory for iPhone users.

Apple has proactively issued alerts to notify its users about potential targeting by NSO Pegasus spyware or state-sponsored attackers. Users are encouraged to follow the safety measures outlined in paragraph 3 to protect themselves from the Blast Pass Pegasus exploit and other common cyberattacks.

Specific Safety Steps to Blast Pass Exploit
  1.  Immediately upgrade to the iOS latest version (16.6.1 or above) which covers the majority of security updates related to ongoing attacks.
  2. Enable lockdown mode (optional; extreme protection mode) to block Blast Pass attack.
  3. Disable the iMessage feature available on iPhones.
Generic Security Steps for Apple Users
  1. Protect devices with strong passcodes and use two-factor authentications on Apple ID.
  2. Install apps from the official Apple Store only to avoid malware/infection.
  3. Use anonymity-based solutions (over the internet while surfing) and mask the identity of key appointment holders/individuals.
  4. Always disable location from Apple devices.
  5. Subscribe to Apple’s security bulletins, threat notifications, and auto OS update features.
  6. Strictly avoid using phones at sensitive locations/meetings.

[embedpost slug=”/nokia-sues-amazon-and-hp-over-video-streaming-patent-violations/”]