• Skip to primary navigation
  • Skip to main content
  • Skip to footer
Logo of Agilient Security Consultants, Australia

Agilient Security Consultants Australia

The Best Security Consultants

Menu
  • Industries
      • Aviation and Airport Security Consultants Australia
      • Defence Industry Security Consulting
      • Government Security Consulting
      • Healthcare & Hospitals Security Consulting
      • Corrections and Detention
      • Maritime Security Consultant
      • Aged Care Facilities
      • Mining, Oil & Gas
      • Public Venues & Events
      • Rail
      • School and Education Security Consultant
      • Telecommunications Security Consultant
      • Utilities
      • Places of Faith and Worship
    • advice-colleagues-communication-newIndustries
  • Services
      • Cybersecurity Consultants
      • Protective Security
      • Business Resilience
      • Building Security Consultants
      • Security Audits
      • Cyber Audits
      • Data
      • Pandemic Planning
      • Azure
      • Electronic Security
      • IT Disaster Recovery Planning
      • Business Continuity Consultants
      • Identity Theft Consultant​
      • Security Consultants
      • Security Camera and CCTV Consultant
      • ISO
      • Duress Alarms
      • Cloud
      • AWS
      • Awareness Training
      • Penetration Testing
      • Security Risk Assessment Consultants
      • Managed Security Service Provider
      • Protection against Vehicles as a Weapon
    • training-1Services
  • Locations
    • Security Consultant Melbourne
    • Security Consultant Sydney
    • Security Consultant Brisbane
    • Security Consultant Adelaide
    • Security Consultant Canberra
    • Security Consultant Perth
  • Resources
    • menumanagers-dealing-customer-agreTraining
    • working-together-newJoin The Tribe
    • Webinars_3-1.jpgUpcoming and Past Events
    • hacking-detected-shutterstock_newResources
  • Articles
  • About
    • About Us
      We are an Australian owned and operated security company specialising in risk, cybersecurity, protective security, crisis and business continuity management services.
    • frequently-asked-questions-smallFAQ’s
    • bg-menu-government-institutionsConsultant Registration
  • Contact Us
Contact Us

QuaDream and NSO Group Weaponize iPhone Bug

You are here: Home / Security News / QuaDream and NSO Group Weaponize iPhone Bug

Israeli spyware firms NSO Group and QuaDream have both weaponized a recent iPhone bug. QuaDream, a low-profile Israeli surveillance technology company, develops smartphone hacking tools that are intended to be used by Government clients. NSO Group is an Israeli technology firm primarily known for its proprietary spyware Pegasus, which is capable of remote zero-click surveillance of smartphones.

Similarities between QuaDream and NSO Group

Some sources have noted that NSO Group and QuaDream’s exploits were similar, because they leveraged many of the same vulnerabilities hidden inside Apple’s instant messaging app. The exploits were so identical that when Apple fixed the underlying flaws, it rendered both NSO Group and QuaDream’s software ineffective. Both firms had used the zero-click exploitation tool to gain entry into their victim’s phone.

How do zero-click exploits work?

Zero-click exploits seem somewhat simple to carry out, as the threat actor does not need to plant phishing simulations or click bait. In most cases, the threat actor designs the vulnerability on specific target applications such as WhatsApp, Telegram or Skype. They can be in the form of:

  • MMS
  • Text messages
  • Authentication Requests
  • Phone calls

Keeping your phone safe

Before the fix was installed by Apple, self-described data breach hunter Chris Vickery advised that “there’s absolutely nothing you can do to protect your phone”. However, keeping your software updated is the easiest way to defend yourself from attacks, as companies release fixes via updates, once they discover new vulnerabilities. Our advice is to:

  • Keep your phone updated, as newer updates come with different security patches against these vulnerabilities.
  • Be cautious when installing a new application and vigilant about permissions.
  • Do not jail break your device as it reduces the efficiency of your controls and the safety restrictions that come built-in to your device.

For more information on how to keep your phone safe from exploitation tools, contact us at Agilient.

Author: Mahdi Kobeissi, Agilient Consultant

Tweet
Share

Security News

Looking for a security partner? Get in touch with Agilient.

Looking for practical and cost-effective security and risk solutions for your government department, agency or company? Speak with Australia’s leading senior security, risk and resilience experts.


Looking for a pandemic planning partner? Get in touch with Agilient.

Looking for practical and cost-effective risk management solutions for your government department, agency or company? Speak with Australia’s leading senior risk and emergency management experts.



Footer

Agilient is a proud member of

Ai Group Defence Council
Australian Industry & Defence Network
Australian Security Industry Association
Sydney Aerospace & Defence Interest Group

Company and Licensing Details:

ABN: 37 157 911 441
NSW Security Master Licence # 410783087
ACT Security Master Licence # 17502184
Vic Security Registration # 878-460-40S
Qld Security Firm Licence # 3834422

Join The Tribe

Sign up to receive our regular Agilient newsletter including the latest security, risk and resilience updates

Sign up now

Copyright © 2025 Agilient – Level 14, 275 Alfred St, North Sydney NSW 2060 Australia – 1300 341 692

Our Services

Security Consultant

Security Consultant Sydney

Security Consultant Melbourne

Security Consultant Canberra
Security Consultant Perth

Security Consultant Adelaide

Security Consultant Brisbane