Multimedia content
- Images (2)
- Igor Kuznetsov, head of the EEMEA unit at Kaspersky Global Research and Analysis Team (GReAT)
- Triangulation attack on iOS
- All (2)
Kaspersky reports on new mobile Advanced Persistent Threat (APT) campaign targeting iOS devices
During the analysis, it was confirmed that there was no impact on the company’s products, technologies and services, and no Kaspersky customer user data or critical company processes were affected
As APT actors are constantly evolving their tactics and searching for new weaknesses to exploit, businesses must prioritise security of their systems
Kaspersky (www.Kaspersky.co.za) researchers have uncovered (https://apo-opa.info/3oBaJ9D) an ongoing mobile Advanced Persistent Threat (APT) campaign targeting iOS devices with previously unknown malware. Dubbed as ‘Operation Triangulation’, the campaign distributes zero-click exploits via iMessage to run malware gaining complete control over the device and user data, with the final goal to hiddenly spy on users.
Kaspersky experts have uncovered (https://apo-opa.info/3oBaJ9D) a new mobile APT campaign while monitoring the network traffic of its corporate Wi-Fi network using the Kaspersky Unified Monitoring and Analysis Platform (KUMA). Upon further analysis, company researchers discovered the threat actor has been targeting iOS devices of dozens of company employees.
The investigation of the attack technique is still ongoing, but so far Kaspersky researchers were able to identify the general infection sequence. The victim received a message via iMessage with an attachment containing a zero-click exploit. Without any further interaction, the message triggered a vulnerability that led to code execution for privilege escalation and provided full control over the infected device. Once the attacker successfully established its presence in the device, the message was automatically deleted.
Further, the spyware quietly transmitted private information to remote servers: including microphone recordings, photos from instant messengers, geolocation and data about a number of other activities of the owner of the infected device.
During the analysis, it was confirmed that there was no impact on the company’s products, technologies and services, and no Kaspersky customer user data or critical company processes were affected. The attackers could only access data stored on the infected devices. Although not certain, it is believed that the attack was not targeted specifically at Kaspersky – the company’s just first to discover it. The following days will likely bring more clarity about the global exposure of this cyberattack.
“When it comes to cybersecurity, even the most secure operating systems can be compromised. As APT actors are constantly evolving their tactics and searching for new weaknesses to exploit, businesses must prioritise security of their systems. This involves prioritising employee education and awareness, and providing them with the latest threat intelligence and tools to effectively recognise and defend against potential threats,” commented Igor Kuznetsov, head of the EEMEA unit at Kaspersky Global Research and Analysis Team (GReAT). “Our investigation of the Triangulation operation continues. We expect further details on it to be shared soon, as there can be targets of this spy operation outside Kaspersky.”
For additional materials on this APT campaign, visit:
- Securelist.com: https://apo-opa.info/3oBaJ9D
- Kaspersky daily: https://apo-opa.info/3WSCSFS
- Eugene Kaspersky’s blog: https://apo-opa.info/3IQbH8A
To check if your iOS device is infected or not, follow instructions on Securelist. (https://apo-opa.info/3oBaJ9D)
In order to avoid falling victim to a targeted attack by a known or unknown threat actor, Kaspersky researchers recommend implementing the following measures:
- For endpoint level detection, investigation, and timely remediation of incidents, use a reliable security solution for businesses, like Kaspersky Unified Monitoring and Analysis Platform (KUMA).
- Update Microsoft Windows OS and other third-party software as soon as possible and do so regularly
- Provide your SOC team with access to the latest threat intelligence (TI). Kaspersky Threat Intelligence (https://apo-opa.info/43V1DnQ) is a single point of access for the company’s TI, providing it with cyberattack data and insights gathered by Kaspersky spanning over 20 years.
- Upskill your cybersecurity team to tackle the latest targeted threats with Kaspersky online training (https://apo-opa.info/45J0iRN) developed by GReAT experts.
- As many targeted attacks start with phishing or other social engineering techniques, introduce security awareness training and teach practical skills to your team – for example, through the Kaspersky Automated Security Awareness Platform (https://apo-opa.info/3X1m0wN)
Distributed by APO Group on behalf of Kaspersky.
For further information please contact:
Nicole Allman | INK&Co.
nicole@inkandco.co.za
Social Media:
Facebook: https://apo-opa.info/3M3uy0L
Twitter: https://apo-opa.info/3OaLeGw
YouTube: https://apo-opa.info/41wO7V6
Instagram: https://apo-opa.info/42BZnRq
Blog: https://apo-opa.info/42Apbxn
About Kaspersky:
Kaspersky is a global cybersecurity and digital privacy company founded in 1997. Kaspersky’s deep threat intelligence and security expertise is constantly transforming into innovative solutions and services to protect businesses, critical infrastructure, governments and consumers around the globe. The company’s comprehensive security portfolio includes leading endpoint protection, specialized security products and services, as well as Cyber Immune solutions to fight sophisticated and evolving digital threats. Over 400 million users are protected by Kaspersky technologies and we help over 220,000 corporate clients protect what matters most to them. Learn more at www.Kaspersky.co.za.