Hackers Have Been Spying on iPhones for Years

by

September 4, 2019
Security7-Blog Image
 
Google’s Project Zero announced some big news last Thursday: hackers have been using “Watering Hole” style attacks for years to spy on iPhones who visit compromised websites.

In the blog post (https://googleprojectzero.blogspot.com/2019/08/a-very-deep-dive-into-ios-exploit.html) written by Ian Beer, he says hackers had been discretely attacking iPhones who visited compromised websites.

Victims were targeted and attacked indiscriminately. The blog post doesn’t name which websites were compromised by hackers but Beer says they were regularly visited by people. Beer claims the sites in question were visited thousands of times a week.

According to Beer, Project Zero found five different exploit chains that leveraged 12 individual security flaws. 7 of those flaws were found to be a part of Apple’s built-in iPhone web browser, Safari.

Each of the attack chains allows the attacker to gain “root” access to the device. Root access is the highest level of access on an iPhone. Root access would allow a hacker to install malicious programs that would allow them to spy on an iPhone user without the user ever knowing they were being spied on.

Google claims attackers were using this exploit to steal photos, messages, stored passwords and even use the phone’s built-in GPS to physically locate a hacked individual while they use their phone.

Apple was notified by Project Zero back in February of this year. Apple patched the security flaws six days later with the release of iOS 12.1.4.

Beer says while the patch seemed to be effective, it doesn’t mean that similar attacks aren’t currently underway. Apple recently launched a $1 million bounty program. The “award,” if you can call it that, will go to anyone who could find flaws that allow an attacker to gain root access.

If there’s more news to come will keep you posted. Otherwise, I think I’m in the market for a new phone. The one in the photo below looks promising…

 

chatter phone

Like our blog? Subscribe using the CTA in the upper right hand corner of this page. Feel like sharing your thoughts with us? Use the comment section below.

Don’t forget to follow us on LinkedIn and Twitter

 

Carl Keyser is the Content Manager at Integris.

Keep reading

Strong Cybersecurity Postures: How to Unleash their Power

Strong Cybersecurity Postures: How to Unleash their Power

In the vast digital landscape where virtual dragons and sneaky trolls roam a strong cybersecurity posture has never been more important. Imagine a band of modern-day knights led by our protagonist, Alex. Armed with a trusty laptop and a cup of coffee, Alex navigates...

How to Spot a Phishing Attack in 2023

How to Spot a Phishing Attack in 2023

In 2023 cyber threats lurk behind every tree trunk in today's digital jungle, and cybersecurity awareness is more critical than ever. Among the craftiest of these threats are phishing attacks. Phishing attacks are cunningly engineered with social manipulation at their...

How to Choose an IT Consultant in Boulder, CO

Regardless of industry size or type, Boulder IT consultants play a massive role in the way companies in the Boulder area do business. While most companies may have their own in-house IT department, many of these departments are small and cannot handle all the...