1 min read

Hackers Have Been Spying on iPhones for Years

Featured Image
Security7-Blog Image
Google's Project Zero announced some big news last Thursday: hackers have been using "Watering Hole" style attacks for years to spy on iPhones who visit compromised websites.

In the blog post (https://googleprojectzero.blogspot.com/2019/08/a-very-deep-dive-into-ios-exploit.html) written by Ian Beer, he says hackers had been discretely attacking iPhones who visited compromised websites.

Victims were targeted and attacked indiscriminately. The blog post doesn't name which websites were compromised by hackers but Beer says they were regularly visited by people. Beer claims the sites in question were visited thousands of times a week.

According to Beer, Project Zero found five different exploit chains that leveraged 12 individual security flaws. 7 of those flaws were found to be a part of Apple's built-in iPhone web browser, Safari.

Each of the attack chains allows the attacker to gain "root" access to the device. Root access is the highest level of access on an iPhone. Root access would allow a hacker to install malicious programs that would allow them to spy on an iPhone user without the user ever knowing they were being spied on.

Google claims attackers were using this exploit to steal photos, messages, stored passwords and even use the phone's built-in GPS to physically locate a hacked individual while they use their phone.

Apple was notified by Project Zero back in February of this year. Apple patched the security flaws six days later with the release of iOS 12.1.4.

Beer says while the patch seemed to be effective, it doesn't mean that similar attacks aren't currently underway. Apple recently launched a $1 million bounty program. The "award," if you can call it that, will go to anyone who could find flaws that allow an attacker to gain root access.

If there's more news to come will keep you posted. Otherwise, I think I'm in the market for a new phone. The one in the photo below looks promising...


chatter phone

Like our blog? Subscribe using the CTA in the upper right hand corner of this page. Feel like sharing your thoughts with us? Use the comment section below.

Don't forget to follow us on LinkedIn and Twitter


Are Passkeys the Future? Apple Seems to Think So...

It's no secret that passwords are a pain in the butt. They can be difficult to remember, they're a huge target for cybercriminals, etc.

Read More

Alert: Follina aka CVE-2022-30190

A newly discovered exploit is using a flaw in Microsoft's Support Diagnostic Tool (MSDT) to remotely take over end-points via compromised Word...

Read More

Chaos/Yashma: The Torrid Tale of a GUI Based Ransomware Builder...

It used to take a good deal of coding knowledge to build a website or an application. That's not the case anymore. You can build a website in...

Read More