AGL 38.02 Increased By ▲ 0.08 (0.21%)
AIRLINK 197.36 Increased By ▲ 3.45 (1.78%)
BOP 9.54 Increased By ▲ 0.22 (2.36%)
CNERGY 5.91 Increased By ▲ 0.07 (1.2%)
DCL 8.82 Increased By ▲ 0.14 (1.61%)
DFML 35.74 Decreased By ▼ -0.72 (-1.97%)
DGKC 96.86 Increased By ▲ 4.32 (4.67%)
FCCL 35.25 Increased By ▲ 1.28 (3.77%)
FFBL 88.94 Increased By ▲ 6.64 (8.07%)
FFL 13.17 Increased By ▲ 0.42 (3.29%)
HUBC 127.55 Increased By ▲ 6.94 (5.75%)
HUMNL 13.50 Decreased By ▼ -0.10 (-0.74%)
KEL 5.32 Increased By ▲ 0.10 (1.92%)
KOSM 7.00 Increased By ▲ 0.48 (7.36%)
MLCF 44.70 Increased By ▲ 2.59 (6.15%)
NBP 61.42 Increased By ▲ 1.61 (2.69%)
OGDC 214.67 Increased By ▲ 3.50 (1.66%)
PAEL 38.79 Increased By ▲ 1.21 (3.22%)
PIBTL 8.25 Increased By ▲ 0.18 (2.23%)
PPL 193.08 Increased By ▲ 2.76 (1.45%)
PRL 38.66 Increased By ▲ 0.49 (1.28%)
PTC 25.80 Increased By ▲ 2.35 (10.02%)
SEARL 103.60 Increased By ▲ 5.66 (5.78%)
TELE 8.30 Increased By ▲ 0.08 (0.97%)
TOMCL 35.00 Decreased By ▼ -0.03 (-0.09%)
TPLP 13.30 Decreased By ▼ -0.25 (-1.85%)
TREET 22.16 Decreased By ▼ -0.57 (-2.51%)
TRG 55.59 Increased By ▲ 2.72 (5.14%)
UNITY 32.97 Increased By ▲ 0.01 (0.03%)
WTL 1.60 Increased By ▲ 0.08 (5.26%)
BR100 11,727 Increased By 342.7 (3.01%)
BR30 36,377 Increased By 1165.1 (3.31%)
KSE100 109,513 Increased By 3238.2 (3.05%)
KSE30 34,513 Increased By 1160.1 (3.48%)

ISLAMABAD: The National Telecommunication and Information Security Board (NTISB) has warned that threat actors are targeting iPhones with zero-click spyware, multiphase polymorphic, and self-destructive malware.

The board has issued an advisory, “Threat Actors Spying on iPhones Through Zero-Click Spyware”, while saying that reportedly, threat actors are targeting iPhones with zero-click spyware; multiphase polymorphic and self-destructive malware. The campaign is considered part of sophisticated and long-running mobile espionage and data ex-filtration activity termed, Operation Triangulation.

The advisory noted that operation triangulation has recently been unearthed, however, it was running since 2019. Russia has accused USA and Apple of facilitating spying activities, though Apple has denied such allegations. It may be inferred that the operation is to spy Russian officials’ iPhones.

The advisory noted that technical details and modus operandi of operation triangulation are as: (a) during initial phase, victims are infected using zero-click exploits via the iMessage platform. Malware runs with root privilege, gaining complete control of the victim’s devices and data, (b) attack begins with iOS devices receiving a message via iMessage containing malicious attachment, (c) as it is a zero-day, the message triggers malware execution automatically without any user interaction and notice, (d) the malware downloads payloads from download server and further exfiltrates victim’s data to under mentioned remote servers: (1) backuprabbit.com (2) businessvideonews.com (3) cloudsponcer.com (4) mobilegamerstats.com (5) snoweeanalytics.com (6) tagclick-cdn.com (7) topographyupdates.com (8) unlimitedteacup.com (9) virtuallaughing.com (10) web-trackers.com (11) growthtransport.com (12) Addatamarket.net (13) datamarketplace.net (14) anstv.net (15) ans7tv.net

In the final phase, both the initial iMessage text and malicious attachment are deleted automatically to erase traces (crafted evasion). The most recent version, which has been successfully targeted is iOS 15.7.

The Board has recommended that (a) all iPhone users are advised to update to latest versions (IOS 16.4.1 or above) (b) keep iMessages off/blocked (c) Avoid storing official data/correspondence in mobile phone, (d) Remote C&C servers domains/URLs at Para 3d (serial 1 to 15) be blocked at firewall by administrators.

In another advisory “Critical Vulnerabilities in Apple Products”, the Board has stated that Apple has released security updates for critical vulnerabilities including one zero day (CVE-2023-38606; Kernel State Modification Vulnerability). CVE-2023-38606 is being exploited by threat actors in connection to Operation Triangulation to execute malicious code with kernel privileges and gain unauthorized access of victim devices.

All Apple products (iPhone, iPad, iPod, macOS, tvOS and watchOS) are affected with above mentioned vulnerability and consequently, patches/updated versions are available.

The board has stated that above in view, all Apple devices users are advised to update to following latest versions from official Apple store: a. iOS - Version 16.6 and 15.7.8 b. tvOS - Version 16.6 c. iPadOS - Version 16.6 and 15.7.8 d. watchOS - Version 9.6 e. iPodOS - Version 16.6 and 15.7.8 f. macOS Ventura - Version 13.5 g. macOS Monterey - Version 12.6.8 h. macOS Big Sur - Version 11.7.9.

Copyright Business Recorder, 2023

Comments

Comments are closed.