- By Vikas Yadav
- Fri, 02 Jun 2023 07:27 PM (IST)
- Source:JND
KASPERSKY, a cybersecurity firm, discovered a campaign that it named - Operation Triangulation. During the inspection, the company found that the attacker infects an iPhone through zero-click exploits using the iMessage platform. The malware operates with "root privileges" that can take control of your device and data. This exploit came to light when the company was monitoring their in-house Wi-Fi network when it noticed suspicious activity on iOS devices.
For more details, here is an instance of how an iOS-running device gets compromised.
Operation Triangulation: How the attack compromises an iPhone?
An iPhone running on iOS receives a message via iMessage with the exploit attachment. Without interaction, it triggers a vulnerability in the software that executes malicious codes. These codes request more exploits for privilege escalation from the C&C server. Once the download process is complete, the message, and the attachment, are deleted.
After it gains privilege access, it collects user data and download plugins from the C&C server. It transmits details that include audio recordings, pictures and location data from the infected handset, IANS, citing the team of experts noted. A point worth noting is that the attacker was successful in accessing 'data stored' on the device only.
iMessage Attack: Which iOS versions were targeted?
The infection dates back to 2019. Presently, the recent case includes iOS 15.7. It is an ongoing attack.
iOS vulnerability: How to be safe?
While businesses must ensure the implementation of robust security systems, educating and raising awareness about such threats is equally important. As Kaspersky will float more information in the future, we can expect more targets of cyber espionage by attackers.
Hence, it is recommended that a user should update their software and third-party apps regularly. This will help limit such attempts and further bolster awareness of security on iPhone devices.