Security researchers have found that the virus has been used in attacks on iPhones for four years. affecting thousands of phones It revealed a very sophisticated attack method. It was revealed that Moscow-based cyber security firm Kaspersky was among those exposed to these attacks. This attack is considered one of the most advanced attacks.
One of the most striking points about the security vulnerability is that unidentified attackers have previously not included in the documentationthey used a hardware feature that only Apple or chip providers know about.
A vulnerability not included in the documentation is being exploited
Kaspersky Boris Larin, one of the researchers, stated that their use of this unknown feature and the sophistication of the vulnerability showed that the attackers had high technical skills. Stating that they do not know how the attackers noticed this vulnerability, Larin said that they are evaluating all possibilities.
The names targeted in the Backdoor operation are not ordinary names. According to Russian officials, among the thousands of phones targeted in these attacks, people working in embassies and carrying out diplomatic missions was also included. Researchers still don’t know who the attackers were, how they discovered the vulnerability, or what they used it for. He stated that over a four-year period, spyware was sent via iMessage texts and installed on the system without the recipient taking any action.
It was revealed that sensitive data was leaked
It was sent among the data captured by the attackers from the devices affected by the attack. microphone recordings, photographs, geolocations and other sensitive data and copied it to its own servers. The attackers, who lost access when the devices were restarted, continued to exploit the vulnerability in the system by constantly sending new messages.
Attackers use four zero day vulnerability It was also closed with security patches released later. It was stated that the hidden hardware feature that caused this attack was also found in Mac, iPod, Apple TV and Apple Watch. Apple has also released patches for these platforms. Kaspersky researchers say “TriangulationThe effects of the vulnerability called ” are not fully known yet. On the other hand, it is stated that the attackers bypassed hardware-based memory protection protocols.