"đš iPhone Triangulation: A New Era in Hardware-Level Cyber Espionage đš"
Kaspersky's recent findings reveal a concerning truth in the world of cyber warfare. They've named it "Operation Triangulation.". This spyware campaign, active since 2019, hijacks iPhones using four zero-day vulnerabilities, including CVE-2023-41990, CVE-2023-32434, CVE-2023-32435, and CVE-2023-38606. The technical report on "Operation Triangulation: The Last Hardware Mystery" reveals a sophisticated cyberattack targeting iPhones. This attack utilized a zero-click iMessage exploit involving four zero-days, capable of affecting iOS versions up to 16.2.
The exploit chain began with a malicious iMessage attachment exploiting the CVE-2023-41990 vulnerability in an undocumented TrueType font instruction. This led to privilege escalation through a complex JavaScript exploit, leveraging the JavaScriptCore debugging feature and an integer overflow vulnerability (CVE-2023-32434) for broader access.
A key aspect of this attack was bypassing hardware-based security in recent iPhone models using a hardware feature of Apple-designed SoCs, mitigated as CVE-2023-38606. The exploit's sophistication and ability to circumvent advanced hardware-based protections leave us with the big question; Since this feature is not used by the firmware, how did the attackers know how to take advantage of it?
#CyberSecurity #InfoSec #iPhoneTriangulation #ZeroDay #CVE2023 #AppleSecurity #HardwareExploits #Kaspersky #BleepingComputer đ±đđ»
Sources:
- BleepingComputer: Article by Bill Toulas
- Securelist: Analysis by Boris Larin & Team
â