Connect with us

Hi, what are you looking for?

Mobile

Hackers use new security vulnerabilities to hack a completely updated iPhone

Hackers use new security vulnerabilities to hack a completely updated iPhone

The hacker behind the SolarWinds supply chain attack last year recently exploited an iOS vulnerability to put millions of iPhones at risk through a comprehensive update. Cyber attacks are part of malicious e-mail campaigns designed to steal online authentication data from Western European governments.

Cybersecurity researchers Maddie Stone and Clement Lesin stated that “a possible Russian government-sponsored issue” is the use of an unknown vulnerability in iOS to send malicious messages to government officials through LinkedIn. iPhone Purple iPhone | TechCrunch’s exploit targets iOS 12.4 to 13.7, sending users to domains that install malware on fully updated iPhones.

It collects authentication cookies from various popular websites, including Google, LinkedIn, Facebook, and Yahoo, and sends them to an IP address controlled by hackers via WebSocket-not only for iPhones, but also for iPads with the same operating version.

For this exploit to work, all the victim needs to do is open Safari. In browsers with site isolation enabled (such as Firefox and Chrome), the attack has been weakened. Apple fixed this zero-day vulnerability in March of this year, but it shows how easy it is to hack into safer systems or even fully updated devices without the user’s knowledge. In this case, we can only wait for future repairs.

Hackers use new security vulnerabilities to hack a completely updated iPhone

OVERVIEW:

Cybersecurity researchers Maddie Stone and Clement Lesin stated that “a possible Russian government-sponsored issue” is the use of an unknown vulnerability in iOS to send malicious messages to government officials through LinkedIn.iPhone Purple iPhone | TechCrunch’s exploit targets iOS 12. For this exploit to work, all the victim needs to do is open Safari. Apple fixed this zero-day vulnerability in March of this year, but it shows how easy it is to hack into safer systems or even fully updated devices without the user’s knowledge.

mail2box786@gmail.com'
Written By

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

You May Also Like

Tech

The China Telecom site shared key details of the Open A35 before its launch. It shared price information, images, and specifications. MediaTek Helio P35...

Mobile

iPhone SE3, The iPhone S, could not be released as a sequel 2020 this year. According to new reports, the iPhone SE 3 is...

Entertainment

WWE After the Bell with Corey Graves and Vic Joseph will play host to special guests and surprises in the lead-up to WrestleMania 37 with daily episodes beginning...

Extra

Isn’t it tempting to know about Ethan Klein’s Net Worth? That’s why you’re here, and I assure you you’ll find the exact figure of...