More

    Apple IPhone: iPhone Users Alert! Cybersecurity Experts Warns About Apple iPhone Vulnerability


    The cybersecurity experts of Kaspersky uncovered a significant hardware vulnerability in Apple iPhones, crucial to the Operation Triangulation attacks. Do you need to worry? Here is what cyber experts say.

    Kaspersky’s GReAT Team Sheds Light on Operation Triangulation and Apple SoC Vulnerability

    Kaspersky’s Global Research and Analysis Team (GReAT) has made a groundbreaking discovery related to Apple iPhones, exposing a previously unknown hardware feature. This revelation is pivotal to the Operation Triangulation campaign, a series of sophisticated attacks on Apple devices. The team recently presented this discovery at the prestigious 37th Chaos Communication Congress in Hamburg.

    Vulnerability in Apple SoC: Operation Triangulation Exposed

    Kaspersky’s GReAT team identified a vulnerability in Apple’s System on a Chip (SoC) that played a crucial role in the Operation Triangulation attacks. This vulnerability allowed attackers to bypass the hardware-based memory protection on iPhones running iOS versions up to iOS 16.6. The hardware feature, possibly designed for testing or debugging, became a critical tool for attackers in manipulating protected memory regions, ultimately gaining full control over the targeted devices. Apple responded by addressing the issue, marking it as CVE-2023-38606.

    Challenging Detection: Security Through Anonymity

    The discovered hardware feature was not publicly documented, posing a significant challenge in its detection and analysis using conventional security methods. The GReAT researchers engaged in extensive reverse engineering, focusing on Memory-Mapped I/O (MMIO) addresses critical for efficient communication between the CPU and peripheral devices. Unknown MMIO addresses, utilized by attackers to bypass hardware-based kernel memory protection, presented a formidable challenge. The team delved into the intricate workings of the SoC, involving a meticulous examination of device tree files, source codes, kernel images, and firmware.

    Boris Larin’s Insights: A Complex Vulnerability

    Boris Larin, Principal Security Researcher at Kaspersky’s GReAT, emphasizes the extraordinary nature of this vulnerability. He highlights the challenges posed by the closed iOS ecosystem, requiring a deep understanding of both hardware and software architectures. Larin points out that even advanced hardware-based protections can be rendered ineffective in the face of a sophisticated attacker, particularly when there are hardware features allowing bypassing of these protections.

    Operation Triangulation: An APT Campaign Unveiled

    “Operation Triangulation” is revealed as an Advanced Persistent Threat (APT) campaign targeting iOS devices, utilizing zero-click exploits distributed via iMessage. This sophisticated campaign enables attackers to gain complete control over targeted devices and access user data. Apple responded with security updates addressing four zero-day vulnerabilities identified by Kaspersky researchers, impacting a wide range of Apple products.

    Kaspersky informed Apple about the exploitation of the hardware feature, leading to its subsequent mitigation by the company. This collaboration emphasizes the importance of proactive information sharing between security researchers and technology companies to address and rectify vulnerabilities promptly.

    CyberSecurity Experts Suggests Crucial Safety Steps Against Cyberattacks

    – Regularly update operating systems, applications, and antivirus software to patch known vulnerabilities.

    – Provide Security Operations Center (SOC) teams with access to the latest threat intelligence.



    Source link

    Latest articles

    spot_imgspot_img

    Related articles

    spot_imgspot_img

    Discover more from Blog | News | Travel

    Subscribe now to keep reading and get access to the full archive.

    Continue reading