Post by account_disabled on Dec 11, 2023 6:08:12 GMT
Kaspersky previously exposed a campaign called 'Operation Triangulation' as an Advanced Persistent Threat (APT) targeting iOS devices using a sophisticated method of distributing zero -click exploits via iMessage and eventually take full control of users' devices and data. Experts estimate the main goal may involve covert surveillance of users. This also affects Kaspersky employees. Due to the complexity of the attack and the closed nature of the iOS ecosystem , the task force team spent a significant amount of time and resources conducting a detailed technical analysis. At the Security Analyst Summit, Kaspersky experts revealed new, previously undisclosed details. It is an attack chain that takes advantage of five vulnerabilities , four of which are previously unknown zero-day vulnerabilities.
This was fixed after Kaspersky researchers reported the discovered vulnerability to Apple . Kaspersky experts identified the first access point through the vulnerability of the font processing library or fonts. The second is a vulnerability in the memory map code that would allow access to a device's Email Data physical memory. Additionally, attackers can exploit two other vulnerabilities. To bypass hardware security features of the latest Apple processors, the research also found that In addition to being able to remotely infect Apple devices via iMessage without user interaction, Attackers also have a platform to attack via the Safari web browser, a fifth vulnerability discovered and patched. The Apple team has officially released the security update.
Additionally, finding a balance between shutdown and accessibility can result in better security measures.” Although the victims this time were Kaspersky employees and senior and mid-level executives of the company, as well as researchers in Russia, Europe, and the Middle East. Including Türkiye and Africa But Kaspersky was not the only target of this attack. In addition to publishing reports and developing utilities. Triangle_check In addition to special Triangle_check, GReAT experts have also created an email address so that interested parties can participate in the investigation. The result is Kaspersky researchers have confirmed that It has come to light that others have also fallen victim to Operation Triangulation , and advice has been given to all victims to increase their safety.
This was fixed after Kaspersky researchers reported the discovered vulnerability to Apple . Kaspersky experts identified the first access point through the vulnerability of the font processing library or fonts. The second is a vulnerability in the memory map code that would allow access to a device's Email Data physical memory. Additionally, attackers can exploit two other vulnerabilities. To bypass hardware security features of the latest Apple processors, the research also found that In addition to being able to remotely infect Apple devices via iMessage without user interaction, Attackers also have a platform to attack via the Safari web browser, a fifth vulnerability discovered and patched. The Apple team has officially released the security update.
Additionally, finding a balance between shutdown and accessibility can result in better security measures.” Although the victims this time were Kaspersky employees and senior and mid-level executives of the company, as well as researchers in Russia, Europe, and the Middle East. Including Türkiye and Africa But Kaspersky was not the only target of this attack. In addition to publishing reports and developing utilities. Triangle_check In addition to special Triangle_check, GReAT experts have also created an email address so that interested parties can participate in the investigation. The result is Kaspersky researchers have confirmed that It has come to light that others have also fallen victim to Operation Triangulation , and advice has been given to all victims to increase their safety.