Hackers target iPhones with unknown malware via iMessages to spy on users

Cybersecurity company Kaspersky discovered the mobile Advanced Persistent Threat (APT) campaign targeting iOS devices with previously unknown malware. Dubbed as 'Operation Triangulation', the ongoing campaign distributes zero-click exploits via iMessage to run malware gaining complete control over the device and user data, with the final goal to "hiddenly spy on users".

Hackers are targeting iPhones with previously unknown malware, via iMessage to, gain complete control over the iOS device and spy on users, cyber-security researchers warned on Friday.

Cybersecurity company Kaspersky discovered the mobile Advanced Persistent Threat (APT) campaign targeting iOS devices with previously unknown malware.

Advertisement

Dubbed as 'Operation Triangulation', the ongoing campaign distributes zero-click exploits via iMessage to run malware gaining complete control over the device and user data, with the final goal to "hiddenly spy on users".

The experts uncovered the campaign while monitoring the network traffic of its corporate Wi-Fi network.

Advertisement

Upon further analysis, researchers discovered the threat actor has been targeting iOS devices of dozens of company employees.

This is how the new malware campaign works.

Advertisement

The victim receives a message via iMessage with an attachment containing a zero-click exploit.

Without any further interaction, the message triggers a vulnerability that leads to code execution for privilege escalation and provides full control over the infected device.

Advertisement

Once the attacker successfully establishes its presence in the device, the message is automatically deleted.

"Further, the spyware quietly transmitted private information to remote servers: including microphone recordings, photos from instant messengers, geolocation and data about a number of other activities of the owner of the infected device," the team noted.

Advertisement

The attackers could only access data stored on the infected devices. Although not certain, it is believed that the attack was not targeted specifically at Kaspersky.

"As APT actors are constantly evolving their tactics and searching for new weaknesses to exploit, businesses must prioritise security of their systems.

Advertisement

"This involves prioritising employee education and awareness, and providing them with the latest threat intelligence and tools to effectively recognize and defend against potential threats," said Igor Kuznetsov, head of the EEMEA unit at Kaspersky Global Research and Analysis Team (GReAT).

"Our investigation of the 'Triangulation' operation continues. We expect further details on it to be shared soon, as there can be targets of this spy operation outside Kaspersky," he added.

Advertisement

In order to avoid falling victim to a targeted attack, update third-party software as soon as possible and do so regularly, the researchers advised.

Also read | Foxconn to start manufacturing iPhones at Karnataka plant by next April: Minister

Advertisement

Also read | iOS 17 new feature may turn locked iPhones into smart home displays: Report

Advertisement