IMessage loophole has existed for a year. Recently, 37 journalists fell victim to the loophole, allowing the bad guys who are said to work for the government to monitor the activities of journalists. According to a report from the University of Toronto & # s citizen lab, they found an operation between July and August 2020, one of which was carried out by a government agent. < / P > < p > the operation attacked 37 mobile phones owned by journalists, producers, anchors and executives of news gathering agencies, mainly targeting al Jazeera. < / P > < p > these attacks use the NGO group’s Pegasus spyware, especially a vulnerability called Kismet. It is believed that the vulnerability is an “invisible zero hit vulnerability in IMessage” and a zero day vulnerability for IOS 13.5.1 and other possible versions. < / P > < p > according to the stolen iPhone logs collected by citizen lab, the same vulnerability was exploited by the NSO customers who were attacked from October to December in 2019, which indicates that the vulnerability has not been found or fixed for quite a long time. < / P > < p > the group was attacked by four Pegasus operators, one of whom is believed to be monarchy from Saudi Arabia, and the other is believed to be snake kestrel, who carried out the attack on behalf of the UAE. < p > < p > < p > < p > the victims of these two attacks on Al Jazeera TV were probably accused of tampering with the photos of her country. < / P > < p > once attacked, the target user’s iPhone will start to upload a large amount of data, sometimes hundreds of megabytes in total, without the user’s knowledge. The data being transmitted is believed to include ambient audio recorded by the microphone, encrypted phone content, photos taken by the camera, the location of the device, and any passwords or account credentials that may be stored. < / P > < p > an apple statement seen by the guardian said the attacks were highly targeted attacks by nation states against individuals. “We have been urging users to download the latest version of the software to protect themselves and their data,” Apple added, although it also hinted that it could not independently verify the analysis given by citizen labs. < / P > < p > it is reported that this attack carrier does not seem to be suitable for iPhone upgraded to IOS 14 or higher, which may mean that the device using the operating system is currently safe. SpaceX beat blue origin and Northrop Grumman to win a $316 million air force contract