iPhones, usually security bastions, has been tested frequently. We will remember a team of Chinese hackers who managed to hack an iPhone 13 Pro in just 15 seconds during the Tianfu Cup, an international hacking competition held in China. This attack was targeted security breach Executed in Safari browser and despite recent Apple security updatesIt shows the persistence of security vulnerabilities in devices.
Another critical flaw has been detected in the processors of iPhones and Macs. Inside exploit this vulnerabilityhackers managed to steal personal data Available in web browsers. This attack, called “iLeakage”, allows the recovery of private data through a fake website. This flaw highlights the increasing sophistication of cyberattacks, which are no longer limited to software but spread to other software as well. hardware components. But even these attacks seem trivial compared to something recently discovered. extremely complex operation.
“Operation Triangulation”: The most sophisticated attack on the iPhone
At a hacking conference in GermanyKaspersky revealed an attack calledOperation Triangulation“. This is considered an exploit of the iPhone most advanced to date. It starts with a malicious attachment in iMessage, You don’t even need to open it to start the process. The attack then exploits four zero-day vulnerabilities; flaws that developers don’t know about or the public gaining full control of the device. Later transmit sensitive data Information such as microphone recordings, photographs and geographical location are transferred to servers controlled by the attackers. This could be a cyber attack affected thousands of iPhones In Russia, uncover a hardware defect It’s also available on Macs, iPods, iPads, Apple TVs, and Apple Watches.
Apple has since fixed these four vulnerabilitiesBut the existence of this attack raises concerns security of the brand’s hardware systems. Kaspersky underlines that this brand’s advanced hardware protections can also be bypassed. This simply shows hide security details It’s not enough anymore. Due to the evolution and sophistication of cyber attacks, it is vital to have robust and well-designed security measures in place rather than just hoping. Attackers won’t be able to find flaws.