Without any further interaction, the message triggered a vulnerability that led to code execution for privilege escalation and provided full control over the infected device. The victim received a message via iMessage with an attachment containing a zero-click exploit. The investigation of the attack technique is still ongoing, but so far Kaspersky researchers were able to identify the general infection sequence. Upon further analysis, company researchers discovered the threat actor has been targeting iOS devices of dozens of company employees. Kaspersky experts have uncovered a new mobile APT campaign while monitoring the network traffic of its corporate Wi-Fi network using the Kaspersky Unified Monitoring and Analysis Platform (KUMA). Kaspersky researchers have uncovered an ongoing mobile Advanced Persistent Threat (APT) campaign targeting iOS devices with previously unknown malware.ĭubbed as ‘Operation Triangulation’, the campaign distributes zero-click exploits via iMessage to run malware gaining complete control over the device and user data, with the final goal to hiddenly spy on users.
0 Comments
Leave a Reply. |