Categories: Tech News

Malicious Websites Silently Target iPhones

Anticipated as one of the most significant attacks on Apple users. Google researchers have recently found multiple hacked websites that were spreading malicious attacks to infect and hack iPhones.

As per Google, these websites are believed to be operational from the year, were visited thousands of times by users. There is no targeted discrimination and a mere visit to the hacked website is enough to infect the device.

Ian Beer, from “Google Project Zero”, stated that these sites have close to a thousand + visitors per week.

Some of these attacks are also being termed as Zero-Day attacks as they take advantage of security loopholes and system vulnerabilities. Moreover, it is relatively hard to fix such Zero-Day assaults because of the vast disparity in the different types of system loopholes. Finding a fix for such a massive range of vulnerabilities is quite an impossible task

In comparison to Android devices, Apple hacks are relatively tricky and quite expensive, and a full exploit chain can cost up to $3 million. This included all possible system vulnerabilities including browser, OS, kernel, and other parts, to get away from an application sandbox, which is designed to run code inside the phone.

TAG (Google’s Threat Analysis Group) was able to get their hands over 5 different iPhone exploit chains, containing approximately 14 types of system vulnerabilities, wrote Beer. He also cited, that these exploits targeted various iOS versions, including iOS 10 and 12 latest versions.

A successful exploit makes it easy to leave the malware on the device. Beer, further stated that the implant primarily focuses on uploading live location details and stealing essential files. This implant can also access the user’s keychain, which generally contains private credentials. Furthermore, it can also access an encrypted messaging database of various apps like iMessage, WhatsApp, etc.

The good news here is that the implant is not persistent, which means you can easily remove it by rebooting your device. But unfortunately, even a single infection is enough to steal your sensitive information.

Beer further stated that, in light of the stolen information and authentication tokens, the attackers will still be able to access various accounts even if they lose control over the device post-reboot.

Unlike old attacks which were spread through text messages, infected links, phishing emails, this attack seems to be highly broad in scope.

According to Beer, the group is making a continuous effort to hack multiple iPhone devices over the last 2 years.

Prachi Dani

Prachi Dani is a technical content writer who specializes in areas of science and technology. She is highly up to date with technological transitions and transformations. Writing is not her passion but the only thing that carries satisfaction in life. If not writing, you may find her engrossed playing action games on her treasured smartphone.

Recent Posts

  • MAC
  • Top 10

Top 12 Mac CPU Temperature Monitor Apps to Fix Macbook Overheating

“Gentle Reminder : The technology needs a checkup too!” Yes, it is safe to say…

3 hours ago
  • Driver Updater

Epson L3110 Driver and Software Free Download and Update

Read this complete driver installation guide to know the easy but reliable methods to download…

3 hours ago
  • MAC
  • Top 10

14 Best Calendar Apps for Mac in 2024 [Free & Paid]

This article shares the 14 best paid and free calendar apps for Mac to help…

3 hours ago
  • MAC
  • Top 10

13 Best Audio Recording Software For Mac in 2024

If you are looking for good audio recording software, our blog here has listed some…

3 hours ago
  • Driver Updater
  • How To
  • Windows

Goodix Fingerprint Driver for Windows 11, 10 (Download & Update)

Take the help of any of the simple but tried and trusted methods listed and…

21 hours ago
  • How To

How to Turn on Spatial Sound in Windows 10, 11

You can use the methods described in this guide to turn on Spatial Sound in…

22 hours ago