Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 2 / 4
67 résultats taggé iOS  ✕
Jamf says 9% of smartphone have fallen for phishing attacks https://appleinsider.com/articles/24/02/22/apple-users-are-increasingly-falling-victim-to-malware-phishing-and-viruses
22/02/2024 22:14:16
QRCode
archive.org
thumbnail

In a report going over the state of malware in 2024, device management firm Jamf says that 9% of mobile users were caught by phishing, while 20% of companies were at risk because of bad smartphone configurations.

appleinsider EN 2024 smartphone phishing macos ios report Statistics
Gold Rush is back to APAC: Group-IB unveils first iOS trojan stealing your face https://www.group-ib.com/media-center/press-releases/goldfactory-ios-trojan/
15/02/2024 16:14:38
QRCode
archive.org

Group-IB, a leading creator of cybersecurity technologies to investigate, prevent, and fight digital crime, has uncovered a new iOS Trojan designed to steal users’ facial recognition data, identity documents, and intercept SMS. The Trojan, dubbed GoldPickaxe.iOS by Group-IB’s Threat Intelligence unit, has been attributed to a Chinese-speaking threat actor codenamed GoldFactory, responsible for developing a suite of highly sophisticated banking Trojans that also includes the earlier discovered GoldDigger and newly identified GoldDiggerPlus, GoldKefu, and GoldPickaxe for Android. To exploit the stolen biometric data, the threat actor utilizes AI face-swapping services to create deepfakes by replacing their faces with those of the victims. This method could be used by cybercriminals to gain unauthorized access to the victim’s banking account – a new fraud technique, previously unseen by Group-IB researchers. The GoldFactory Trojans target the Asia-Pacific region, specifically — Thailand and Vietnam impersonating local banks and government organizations.

Group-IB’s discovery also marks a rare instance of malware targeting Apple’s mobile operating system. The detailed technical description of the Trojans, analysis of their technical capabilities, and the list of relevant indicators of compromise can be found in Group-IB’s latest blog post.

group-ib EN 2024 research faceid stealer iOS trojan GoldPickaxe.iOS
Government hackers targeted iPhones owners with zero-days, Google says https://techcrunch.com/2024/02/06/government-hackers-targeted-iphones-owners-with-zero-days-google-says/
06/02/2024 15:57:41
QRCode
archive.org
thumbnail

One of the hacking campaigns used exploits developed by Variston, a Barcelona-based startup. Sources say the spyware maker is losing staff.

techcrunch EN 2024 security apple cybersecurity google hackers infosec ios iphone spyware surveillance variston zero-days
iShutdown scripts can help detect iOS spyware on your iPhone https://www.bleepingcomputer.com/news/security/ishutdown-scripts-can-help-detect-ios-spyware-on-your-iphone/
17/01/2024 19:23:42
QRCode
archive.org
thumbnail

Security researchers found that infections with high-profile spyware Pegasus, Reign, and Predator could be discovered on compromised Apple mobile devices by checking Shutdown.log, a system log file that stores reboot events.

bleepingcomputer EN 2024 Spyware iPhone Malware Security Apple iOS Pegasus InfoSec Logging Computer
smith (CVE-2023-32434) https://github.com/felix-pb/kfd/blob/main/writeups/smith.md
03/01/2024 13:50:10
QRCode
archive.org

This write-up presents an exploit for a vulnerability in the XNU kernel:

  • Assigned CVE-2023-32434.

  • Fixed in iOS 16.5.1 and macOS 13.4.1.

  • Reachable from the WebContent sandbox and might have been actively exploited.
    *Note that this CVE fixed multiple integer overflows, so it is unclear whether or not the integer overflow used in my exploit was also used in-the-wild. Moreover, if it was, it might not have been exploited in the same way.
    The exploit has been successfully tested on:

  • iOS 16.3, 16.3.1, 16.4 and 16.5 (iPhone 14 Pro Max)

  • macOS 13.1 and 13.4 (MacBook Air M2 2022)

  • All code snippets shown below are from xnu-8792.81.2.

Poulin-Bélanger EN 2023 exploit analysis vulnerability github macos ios CVE-2023-32434
This Clever New Idea Could Fix AirTag Stalking While Maximizing Privacy https://www.wired.com/story/apple-airtag-privacy-stalking-cryptographic-solution/
28/12/2023 09:32:14
QRCode
archive.org
thumbnail

Apple updated its location-tracking system in an attempt to cut down on AirTag abuse while still preserving privacy. Researchers think they’ve found a better balance.

wired EN 2023 ios apple cryptography privacy AirTag
Apple Releases Security Updates to Patch Critical iOS and macOS Security Flaws https://thehackernews.com/2023/12/apple-releases-security-updates-to.html
12/12/2023 08:50:45
QRCode
archive.org
thumbnail

Apple has released patches for iOS, iPadOS, macOS, tvOS, watchOS, and Safari to address multiple vulnerabilities.

thehackernews EN 2023 Apple Security Updates November2023 iOS macOS tvOS watchOS patch CVE-2023-45866
Jamf Threat Labs: Fake Lockdown Mode proof of concept https://www.jamf.com/blog/fake-lockdown-mode/
06/12/2023 18:51:18
QRCode
archive.org
thumbnail

JTL security researchers discover how Lockdown Mode on iOS can be manipulated by a threat actor on compromised or jailbroken iPhones to trick users into believing that their device is protected by Lockdown Mode when in reality when in fact, it's not.

jamf EN 2023 Lockdown Mode iOS jailbroken fake
Apple Confirms Governments Using Push Notifications to Surveil Users - MacRumors https://www.macrumors.com/2023/12/06/apple-governments-surveil-push-notifications/
06/12/2023 14:12:30
QRCode
archive.org
thumbnail

Unidentified governments are surveilling smartphone users by tracking push notifications that move through Google's and Apple's servers, a US...
In a letter to the Department of Justice, Senator Ron Wyden said foreign officials were demanding the data from the tech giants to track smartphones. The traffic flowing from apps that send push notifications put the companies "in a unique position to facilitate government surveillance of how users are using particular apps," Wyden said. He asked the Department of Justice to "repeal or modify any policies" that hindered public discussions of push notification spying.

macrumors EN 2023 privacy iOS iPhone iPad Apple push surveillance
Russian Hackers’ Lawsuit Reveals Weaknesses In Apple’s iOS 16 https://www.forbes.com/sites/thomasbrewster/2023/12/04/russian-hacker-lawsuit-exposes-flaws-in-apples-ios-16
05/12/2023 19:14:12
QRCode
archive.org
thumbnail

A Moscow legal battle strongly indicates that phone forensics tools used by both the FBI and FSB are exploiting security loopholes in Apple’s operating system.

forbes EN 2023 russia ukraine america forensics iphone apple ios ios-16 ios-17 oxygen
Spyware Targeting Against Serbian Civil Society - The Citizen Lab https://citizenlab.ca/2023/11/serbia-civil-society-spyware/
28/11/2023 19:25:25
QRCode
archive.org
thumbnail

We confirm that two members of Serbian civil society were targeted with spyware earlier this year. Both have publicly criticized the Serbian government. We are not naming the individuals at this time by their request. The Citizen Lab’s technical analysis of forensic artifacts was conducted in support of an investigation led by Access Now in collaboration with the SHARE Foundation. Researchers from Amnesty International independently analyzed the cases and their conclusions match our findings.

CitizenLab EN 2023 Serbia Pegasus spyware homekit iOS
Spyware in Serbia: civil society under attack - Access Now https://www.accessnow.org/spyware-attack-in-serbia/
28/11/2023 19:23:19
QRCode
archive.org
thumbnail

Access Now and our partners have discovered that civil society in Serbia have been targeted with invasive spyware technology. Here’s what we know.

accessnow EN 2023 Serbia Pegasus spyware homekit iOS
Triangulation: validators, post-compromise activity and modules | Securelist https://securelist.com/triangulation-validators-modules/110847/
26/10/2023 17:49:57
QRCode
archive.org
thumbnail

In this report Kaspersky shares insights into the validation components used in Operation Triangulation, TriangleDB implant post-compromise activity, as well as details of some additional modules.
#2023 #APT #Apple #EN #Malware #Malware-Description #Triangulation #analysis #iOS #macOS #securelist #spyware

EN macOS spyware Apple Malware-Description 2023 analysis APT iOS Triangulation securelist Malware
iLeakage https://ileakage.com/
25/10/2023 23:45:04
QRCode
archive.org

We present iLeakage, a transient execution side channel targeting the Safari web browser present on Macs, iPads and iPhones. iLeakage shows that the Spectre attack is still relevant and exploitable, even after nearly 6 years of effort to mitigate it since its discovery. We show how an attacker can induce Safari to render an arbitrary webpage, subsequently recovering sensitive information present within it using speculative execution. In particular, we demonstrate how Safari allows a malicious webpage to recover secrets from popular high-value targets, such as Gmail inbox content. Finally, we demonstrate the recovery of passwords, in case these are autofilled by credential managers.

ileakage EN 2023 macos Safari Side-Channel ios Spectre speculative
Hackers can force iOS and macOS browsers to divulge passwords and much more https://arstechnica.com/security/2023/10/hackers-can-force-ios-and-macos-browsers-to-divulge-passwords-and-a-whole-lot-more/
25/10/2023 20:34:57
QRCode
archive.org
thumbnail

iLeakage is practical and requires minimal resources. A patch isn't (yet) available.

arstechnica EN 2023 ileakage macos ios speculative
Active exploitation of Cisco IOS XE Software Web Management User Interface vulnerability https://blog.talosintelligence.com/active-exploitation-of-cisco-ios-xe-software/
17/10/2023 19:57:30
QRCode
archive.org
thumbnail

Cisco has identified active exploitation of a previously unknown vulnerability in the Web User Interface (Web UI) feature of Cisco IOS XE software (CVE-2023-20198) when exposed to the internet or untrusted networks.

talosintelligence EN 2023 Cisco IOS XE Web Management CVE-2023-20198
Apple discloses 2 new zero-days exploited to attack iPhones, Macs https://www.bleepingcomputer.com/news/apple/apple-discloses-2-new-zero-days-exploited-to-attack-iphones-macs/
07/09/2023 20:54:32
QRCode
archive.org
thumbnail

Apple released emergency security updates to fix two new zero-day vulnerabilities exploited in attacks targeting iPhone and Mac users, for a total of 13 exploited zero-days patched since the start of the year.

bleepingcomputer EN 2023 Apple Apple-Watch Code-Execution iOS iPhone Mac watchOS Zero-Day
New Apple iOS 16 Exploit Enables Stealthy Cellular Access Under Fake Airplane Mode https://thehackernews.com/2023/08/new-apple-ios-16-exploit-enables.html
19/08/2023 17:22:46
QRCode
archive.org
thumbnail

Cybersecurity researchers have documented a novel post-exploit persistence technique on iOS 16 that could be abused to fly under the radar and maintain access to an Apple device even when the victim believes it is offline.

The method "tricks the victim into thinking their device's Airplane Mode works when in reality the attacker (following successful device exploit) has planted an artificial Airplane Mode which edits the UI to display Airplane Mode icon and cuts internet connection to all apps except the attacker application," Jamf Threat Labs researchers Hu Ke and Nir Avraham said in a report shared with The Hacker News.

thehackernews EN 2023 iOS apple airplanemode exploit
Apple issues third mobile OS update after zero-click spyware campaign https://cyberscoop.com/apple-os-update-spyware/
26/07/2023 13:18:01
QRCode
archive.org
thumbnail

The patch is the latest to address issues associated with what cybersecurity firm Kaspersky called Operation Triangulation.

cyberscoop EN 2023 Apple Triangulation zero-click iOS CVE-2023-38606
Apple confirms WebKit security updates break browsing on some sites https://www.bleepingcomputer.com/news/security/apple-confirms-webkit-security-updates-break-browsing-on-some-sites/
12/07/2023 09:31:45
QRCode
archive.org
thumbnail

Apple confirmed today that emergency security updates released on Monday to address a zero-day bug exploited in attacks break browsing on some websites, and new ones will be released soon to address this known issue.

bleepingcomputer Apple iOS macOS Rapid-Security-Response Security-Update WebKit
page 2 / 4
4845 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn