In what's being touted as potentially one of the biggest attacks on Watch Class of Lies OnlineiPhone users ever, Google has revealed that a collection of websites were hacked to deliver malware onto iPhones, with the iOS vulnerabilities involved going unchecked and undiscovered for years -- as well as subsequent attacks.
The hacks installed zero-interaction malware into unnamed sites that received thousands of visitors every week. Simply visiting the sites, without clicking or scrolling at all, could deliver a monitoring implant onto users' iPhones.
Google demonstrated that the implant could "steal private data like iMessages, photos and GPS location in real-time"; it also had access to users' keychains and password data, as well as database files containing plaintext of messages sent and received in messaging apps such as Google Hangouts, and even end-to-end encrypted apps including WhatsApp, iMessage, and Telegram.
The malware would be wiped if the iPhone was rebooted, but any sensitive information obtained during the infection could still leave the device, its user, and their online life vulnerable to attack.
SEE ALSO: Apple will announce new 'iPhone 11' and 'iPhone 11 Pro' on September 10While the choice of sites appeared designed to target certain communities, the attack was otherwise indiscriminate.
Google's security research initiative Project Zero posted a "very deep dive" detailing the exploits, which their Threat Analysis Group discovered and disclosed to Apple in Feb. 2019.
The team found five "separate, complete and unique" exploit chains using 14 vulnerabilities. Several were zero-day, meaning Apple was unaware of them at the time of Project Zero's discovery; Apple patched these within the seven-day deadline Google gave in iOS 12.1.4, the same Feb. 7 update that patched the infamous Group FaceTime vulnerability.
The exploits date back to iOS 10 and through updates of iOS 12.1.2, encompassing "almost every version" in that timeframe.
This Tweet is currently unavailable. It might be loading or has been removed.
The number of Apple exploits discovered appears to have risen sharply over the past year. At the end of July, Project Zero revealed six zero-interaction security bugs that could be exploited through iMessage, only five of which Apple had managed to patch by the time the Google team revealed them. And in August, news broke of the SQLite vulnerability, as demonstrated at DEFCON 2019 using the iOS Contacts app, as well as the vulnerability to the Bluetooth-based "KNOB" attack that affected every iPhone and iPad.
Mashable has contacted Apple for comment.
Topics Cybersecurity
(Editor: {typename type="name"/})
Researchers map the koala genome in the name of saving the species
A surprising 'Little Fires Everywhere' finale lets the past burn
Forget Zoom. Here's how to make group video calls on Snapchat instead.
Netflix's 'The Midnight Gospel' pulls the ripcord on reality: Review
Best Samsung Frame deal: Free Music Frame with Frame Pro art TV purchase
Watch a reporter expertly dodged falling lights while delivering news
Amazon scans warehouse workers for fevers using thermal cameras
If you want to start making your own sourdough, start with this DIY tracker
Virtual Reality: The True Cost of Admission (and Why It Doesn't Matter)
Google adds 'Watchlist' to search so you can track TV shows and movies
The internet is talking like Kevin from 'The Office' now
Apple reportedly ready to launch new AirPods in May 2020
接受PR>=1、BR>=1,流量相当,内容相关类链接。