Introduction
Could advertisements be the next gateway for infecting smartphones with spyware? This is the chilling prediction from Bill Marczak of Citizen Lab. He urges iPhone users to enable Lockdown Mode, a feature that can thwart attacks costing up to $20 million.
Key Points | Details |
---|---|
Growing Threats | Smartphones increasingly targeted |
Zero-Day Costs | Up to $20 million for exploits |
Ad-Based Attacks | Spyware through targeted ads |
Protection Measures | Delete unused apps, enable Lockdown Mode |
A Growing Threat Landscape
Smartphones have increasingly become the target of choice for commercial spyware vendors. These vendors argue that their spyware helps law enforcement track down terrorists and criminals. Yet, it often ends up targeting journalists, activists, and political dissenters.
Citizen Lab, a part of the University of Toronto, has been at the forefront in the fight against commercial spyware. They have discovered multiple zero-day vulnerabilities, enabling software vendors to fix the issues.

Skyrocketing Prices for Zero-Day Exploits
In a recent presentation at the IMEDD International Journalism Forum 2023, Marczak revealed that amounts up to $20 million are now being paid for zero-day exploits. These vulnerabilities can compromise smartphones remotely. Most attacks require the target to click on a malicious link. However, ‘zero-click’ attacks, requiring no user interaction, are also becoming more prevalent.
The Advertisements Angle
A report from Israeli newspaper Haaretz disclosed that local ‘cyber companies’ have developed technology to spread spyware through ads1. This approach leverages the targeted nature of modern advertising. While cybercriminals have abused this in the past, spyware vendors are now entering this realm.

“This technology is not just being developed by Israeli firms but is appearing on the horizon and may already be happening,” Marczak commented. He expressed concerns over the hard-to-detect nature of these ad-based attacks, as well as ongoing zero-click attacks.
How to Protect Yourself
Marczak suggests deleting unused chat apps that could serve as an attack vector. For iPhone users, enabling Apple’s Lockdown Mode is highly recommended. This mode limits certain functionalities, reducing the surface area for attacks. Recent exploits by the NSO Group, which used Pegasus spyware, were ineffective against iPhones in Lockdown Mode.
The evolution of spyware attacks is alarming, with advertisements becoming a potential new vector. Taking precautionary measures, such as enabling Lockdown Mode on iPhones, is more crucial than ever. As technology advances, so does the ingenuity of attackers—staying one step ahead is our best defense.
- https://www.haaretz.com/israel-news/2023-09-14/ty-article-magazine/.highlight/revealed-israeli-cyber-firms-developed-an-insane-new-spyware-tool-no-defense-exists/0000018a-93cb-de77-a98f-ffdf2fb60000 ↩︎
+ There are no comments
Add yours