Attackers Exploit IOS with 0-Click iMessage Exploit

Max Register
2 min readDec 31, 2023

--

The news broke about a sophisticated IOS attack dubbed Operation Triangulation by the Russian Information Security Firm Kaspersky on the 27th of December 2023. Attackers send a malicious iMessage attachment that kicks off a chain of four zero-day exploits used to load spyware on the device.

The campaign thought to have been active since 2019, has used these exploits to gather sensitive information from devices. The four zero-day exploits are as follows:

  • CVE-2023–41990Remote Code Execution (RCE) vulnerability sent via iMessage.
  • CVE-2023–32434Integer Overflow vulnerability that allows for arbitrary code execution with kernel privileges.
  • CVE-2023–32435Memory corruption vulnerability used to execute code when processing web content.
  • CVE-2023–38606 — Vulnerability that allows an app to modify kernel state.

As Kaspersky mentions, “What we want to discuss is related to the vulnerability that has been mitigated as CVE-2023–38606. Recent iPhone models have additional hardware-based security protection for sensitive regions of the kernel memory. This protection prevents attackers from obtaining full control over the device if they can read and write kernel memory, as achieved in this attack by exploiting CVE-2023–32434.” All users must maintain updates regularly to avoid falling victim to this type of attack. Hardware vulnerabilities will continue to come to light so keeping your hardware updated and your software will help mitigate the risk of future attacks of this magnitude.

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

--

--

Max Register
Max Register

No responses yet

Write a response