iPhone users should do this to limit being tracked.
Recently, researchers at Kaspersky discovered an APT campaign targeting millions of iPhone users with malware.
Exploiting zero-click vulnerability
Dubbed 'Operation Triangulation,' the campaign exploits a zero-click vulnerability through iMessage to run malware, gaining complete control of the device and user data.
When monitoring corporate WiFi network traffic using the Kaspersky Unified Monitoring and Analysis Platform (KUMA), researchers discovered that the threat agent was targeting the iOS devices . of dozens of company employees.
The victim will first receive an iMessage message with a malicious attachment, exploiting a zero-click vulnerability (no interaction required from the user). The message is automatically deleted after the attacker successfully establishes their presence on the device.
Not stopping there, the spyware also silently sends your personal information to remote servers, including recordings, location, etc.
"When it comes to cybersecurity, even the most secure operating systems can be compromised," commented Igor Kuznetsov, Head of EEMEA at Kaspersky's Global Research and Analysis Group (GReAT). As APT attackers are constantly evolving their tactics and looking for new vulnerabilities to exploit, businesses must prioritize the security of their systems."
What should iPhone users do to limit being tracked?
- For businesses, use reliable security solutions, such as Kaspersky Unified Monitoring and Analysis Platform (KUMA).
- Equip your cybersecurity team to tackle new targeted threats.
- Lockdown Mode was first released on iOS 16, iPad OS 16, and MacOS Ventura 13 last year. When activated, all email attachments (besides images) are disabled. Disable, including link preview.
First, go to Settings - Privacy & Security - Lockdown mode.
"We're pleased to see that Lockdown mode prevented this sophisticated attack and alerted users immediately, even before the threat was discovered," Apple spokesman Scott Radcliffe said in a statement. Apple and security researchers know.
Source from the Internet