![]() ![]() ![]() The implant is written in Objective-C language and has a self-destruction code activated, which runs after 30 days of initial infection. In a blog post by Kaspersky on Wednesday, researchers disclosed technical details of the TriangleDB spyware. TriangleDB Zero-Click SpywareĪpple's attribution to Kaspersky came after the Russian cybersecurity firm earlier this month said it had discovered a campaign dubbed "Operation Triangulation," in which an APT group launched zero-click iMessage exploits on iOS-powered devices to drop spyware in its corporate network (see: Kaspersky Discloses Apple Zero-Click Malware). Kaspersky security researchers Georgy Kucherin, Leonid Bezvershenko and Boris Larin are credited with reporting the vulnerabilities to Apple.Īpple also addressed the anonymously reported third zero-day tracked as CVE-2023-32439, which can result in arbitrary code execution when using maliciously crafted web content. The latest patch addressed flaws in iOS, iPadOS, macOS, watchOS and Safari browser. ![]() Attackers could exploit the flaws and gain arbitrary code execution privileges, the smartphone giant said in its Wednesday security update. The patches released for the flaws tracked as CVE-2023-32434 and CVE-2023-32435 arose from integer overflow and memory corruption issues, respectively. See Also: Live Webinar | The Secret Sauce to Secrets Management ![]() Apple has fixed multiple zero-days that were actively being exploited since 2019 and infect several iOS devices with a spyware implant dubbed TriangleDB via zero-click iMessage exploits. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |