Connect with us

Hi, what are you looking for?

Mobile

Hackers use new security vulnerabilities to hack a completely updated iPhone

Hackers use new security vulnerabilities to hack a completely updated iPhone

The hacker behind the SolarWinds supply chain attack last year recently exploited an iOS vulnerability to put millions of iPhones at risk through a comprehensive update. Cyber attacks are part of malicious e-mail campaigns designed to steal online authentication data from Western European governments.

Cybersecurity researchers Maddie Stone and Clement Lesin stated that “a possible Russian government-sponsored issue” is the use of an unknown vulnerability in iOS to send malicious messages to government officials through LinkedIn. iPhone Purple iPhone | TechCrunch’s exploit targets iOS 12.4 to 13.7, sending users to domains that install malware on fully updated iPhones.

It collects authentication cookies from various popular websites, including Google, LinkedIn, Facebook, and Yahoo, and sends them to an IP address controlled by hackers via WebSocket-not only for iPhones, but also for iPads with the same operating version.

For this exploit to work, all the victim needs to do is open Safari. In browsers with site isolation enabled (such as Firefox and Chrome), the attack has been weakened. Apple fixed this zero-day vulnerability in March of this year, but it shows how easy it is to hack into safer systems or even fully updated devices without the user’s knowledge. In this case, we can only wait for future repairs.

Hackers use new security vulnerabilities to hack a completely updated iPhone

OVERVIEW:

Cybersecurity researchers Maddie Stone and Clement Lesin stated that “a possible Russian government-sponsored issue” is the use of an unknown vulnerability in iOS to send malicious messages to government officials through LinkedIn.iPhone Purple iPhone | TechCrunch’s exploit targets iOS 12. For this exploit to work, all the victim needs to do is open Safari. Apple fixed this zero-day vulnerability in March of this year, but it shows how easy it is to hack into safer systems or even fully updated devices without the user’s knowledge.

Advertisement. Scroll to continue reading.
Content Protection by DMCA.com
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

You May Also Like

Mobile

OnePlus Nord 2 may be the most expensive Nord device to date. This phone is scheduled to go on sale next week, and there...

Apps

Instagram always tries to provide its users with cool features to increase their participation in the posts they download and share on the app....

Apps

WhatsApp has more than 2 billion user bases in more than 100 countries/regions, making it the most popular messaging service. “A great power comes...

Apps

Facebook recently released a video that delves into the algorithm that redirects content to users and how it selects the same content to display....