The government phones that have been targeted so far have been unclassified, and there is no indication that the NSO exploits have been used to gain access to classified information, a senior administration official said.
“We were also very concerned about it because it poses a real and live counterintelligence and security risk for U.S. personnel and U.S. systems around the world,” a senior administration official said.
Apple created a patch in September that fixed the weakness in its mobile operating system. Since that patch only protects a phone after a user downloads the updated software, it is possible that hackers could continue to exploit the weakness to infiltrate phones that had yet to be updated.
Apple asked the State Department employees to take several precautions, including immediately updating their iPhones with the latest software available, which includes the patch. The company said that the attacks Apple had detected “are ineffective against iOS 15 and later.”
Apple’s notification to the diplomats, and to the U.S. government, came after the technology company filed suit against NSO for what it alleges are violations of the Computer Fraud and Abuse Act, a statute passed in 1986, when many computers had less computing power than current cellphones.
It is not clear Apple will prevail, because the statute is intended to protect computer users, not manufacturers. But the essence of the suit, and the addition of NSO to a U.S. blacklist, is an attempt to put the Israeli company in the same category as Chinese or Russian hacking groups, or ransomware operators that rent out their capabilities.
China has used similar types of spyware to repress Muslim minorities, as has Russia against dissidents. Saudi Arabia is believed to have used it in the killing of Mr. Khashoggi, and the subsequent effort to cover up the crime.