Russia says US accessed thousands of Apple phones in spy plot

The FSB said that several thousand Apple phones had been infected, including those of domestic Russian subscribers


REUTERS June 02, 2023

LONDON:

Russia’s Federal Security Service (FSB) said on Thursday it had uncovered a US National Security Agency (NSA) plot using previously unknown malware to access specially made so-called backdoor vulnerabilities in Apple phones.

The FSB, the main successor to the Soviet-era KGB, said that several thousand Apple phones had been infected, including those of domestic Russian subscribers.

The Russian spy agency also said telephones belo­nging to foreign diplomats based in Russia and the former Soviet Union, including those from Nato members, Israel, Syria and China, had been targeted.

Neither Apple nor the NSA immediately respo­nded to emailed requests for comment outside usual US business hours.

‘Software vulnerabilities’

The FSB said the plot showed the close relationship between Apple and the NSA, the US agency responsible for US cryptographic and communications intelligence and security.

“The hidden data collection was carried out through software vulnerabilities in US-made mobile phones,” Russia’s foreign ministry said in a statement.

Also read: BRICS ministers put on show of strength as Putin arrest warrant looms large

“The US intelligence services have been using IT corporations for decades in order to collect large-scale data of Internet users without their knowledge,” the ministry said.

Shortly after Russia sent its troops into Ukraine last year, US and British spies claimed a scoop by uncovering intelligence that President Vladimir Putin was planning to invade. It is still unclear how that intelligence was gained.

Earlier this year, the Kremlin told officials involved in preparations for Russia’s 2024 presidential election to stop using Apple iPhones because of concerns that the devices are vulnerable to Western intelligence agencies.

COMMENTS (2)

test | 1 year ago | Reply I myself do not trust any american company because of the same reasons because almost all american products and businesses have self created vulnerabilities hidden and encoded in the source code of software and the chip known as backdoor which can be later exploited by NSA and other rogue agencies either through one click or 0 click interaction which are called exploits with that backdoor resulting in complete access to the device. Since those backdoors are introduced by the companies for the govts which means they are difficult to detect but they can be detected by analyzing the source code of the microchip and software. That s why open source technologies are good because the underlying code is made public and anyone can point to flaws and upgrade the code according to one s own requirements. Regarding microchip architecture RISC is an open architecture and anyone can modify it to have their own use. Design of microchip does matter so does the software for the chip. By the way jewnited snakes of america has JEDI Joint Enterprise Defence Infrastructure program which is a surveillance program and is used to spy on govts and people all around the world. The better defence is to create your own software and create your own microchips then rest would be fine.
test | 1 year ago | Reply I myself do not trust any american company because of the same reasons because almost all american products and businesses have self created vulnerabilities hidden and encoded in the source code of software and the chip known as backdoor which can be later exploited by NSA and other rogue agencies either through one click or 0 click interaction which are called exploits with that backdoor resulting in complete access to the device. Since those backdoors are introduced by the companies for the govts which means they are difficult to detect but they can be detected by analyzing the source code of the microchip and software. That s why open source technologies are good because the underlying source code is made public and anyone can anayze and contribute to it otherwise we need to have reverse engineers ca
Replying to X

Comments are moderated and generally will be posted if they are on-topic and not abusive.

For more information, please see our Comments FAQ