A previously unknown advanced persistent threat (APT) is targeting iOS devices as part of a sophisticated and long-running mobile campaign dubbed Operation Triangulation that began in 2019. Kaspersky has been tracking this and had this to say:
“The targets are infected using zero-click exploits via the iMessage platform, and the malware runs with root privileges, gaining complete control over the device and user data,”
Joe Saunders, CEO, RunSafe Security had this to say about this threat:
“Even the best developers inadvertently leave open the potential for critical vulnerabilities to be exploited. Scanning & patching as we chase the vulns is inevitable – but this is why we need to invest in secure by design, secure by default and memory safety across software.”
The Kaspersky research on this threat noted that they were hit by this. That shows you how potentially dangerous this can be. And it isn’t known if Apple has patched whatever means the threat actors are using to get control of devices. This is something that I will be watching closely as there’s more to come in terms of detail.
Like this:
Like Loading...
Related
This entry was posted on June 2, 2023 at 8:54 am and is filed under Commentary with tags Apple. You can follow any responses to this entry through the RSS 2.0 feed.
You can leave a response, or trackback from your own site.
Zero Click Exploit Targets iOS Users
A previously unknown advanced persistent threat (APT) is targeting iOS devices as part of a sophisticated and long-running mobile campaign dubbed Operation Triangulation that began in 2019. Kaspersky has been tracking this and had this to say:
“The targets are infected using zero-click exploits via the iMessage platform, and the malware runs with root privileges, gaining complete control over the device and user data,”
Joe Saunders, CEO, RunSafe Security had this to say about this threat:
“Even the best developers inadvertently leave open the potential for critical vulnerabilities to be exploited. Scanning & patching as we chase the vulns is inevitable – but this is why we need to invest in secure by design, secure by default and memory safety across software.”
The Kaspersky research on this threat noted that they were hit by this. That shows you how potentially dangerous this can be. And it isn’t known if Apple has patched whatever means the threat actors are using to get control of devices. This is something that I will be watching closely as there’s more to come in terms of detail.
Share this:
Like this:
Related
This entry was posted on June 2, 2023 at 8:54 am and is filed under Commentary with tags Apple. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.