Connect with us

Hi, what are you looking for?

HEADLINES

Kaspersky reveals details behind spyware used in Operation Triangulation

Kaspersky recently reported on a new mobile Advanced Persistent Threat (APT) campaign that specifically targets iOS devices via iMessage.

Following the report on the Operation Triangulation campaign targeting iOS devices, Kaspersky experts are shedding light into the details about the spyware implant used during the attacks. Dubbed TriangleDB, the implant grants attackers covert surveillance capabilities. It operates solely in memory, ensuring that all evidence of the implant is erased upon device reboot.

Kaspersky recently reported on a new mobile Advanced Persistent Threat (APT) campaign that specifically targets iOS devices via iMessage.

Following the six-month investigation, the company’s researchers have published an in-depth analysis of the exploitation chain and uncovered details of the spyware implant operation.

The implant, dubbed TriangleDB, is deployed by exploiting a kernel vulnerability to acquire root privileges on the targeted iOS device. Once deployed, it operates solely in the device’s memory, hence traces of the infection disappear upon the device reboot. Consequently, if the victim restarts their device, the attacker needs to reinfect it by sending another iMessage with a malicious attachment, initiating the entire exploitation process once again. If no reboot occurs, the implant will automatically uninstall itself after 30 days, unless the attackers extend this period. Operating as complex spyware, TriangleDB performs a wide range of data collection and monitoring capabilities.

Advertisement. Scroll to continue reading.

In total, the implant includes 24 commands with diverse functionalities. These commands serve various purposes, such as interacting with the device’s filesystem (including file creation, modification, exfiltration, and removal), managing processes (listing and termination), extracting keychain items to gather victim credentials, and monitoring the victim’s geolocation, among others.

While analyzing TriangleDB, Kaspersky experts discovered that the CRConfig class contains an unused method called populateWithFieldsMacOSOnly. While not utilized in the iOS implant, its presence suggests the possibility of targeting macOS devices with a similar implant.

“As we delved into the attack, we discovered a sophisticated iOS implant that displayed numerous intriguing oddities. We continue analyzing the campaign and will keep everyone updated with further insights into this sophisticated attack. We call upon the cybersecurity community to unite, share knowledge and collaborate to get a clearer picture around the threats out there,” comments Georgy Kucherin, security expert at Kaspersky Global Research and Analysis Team (GReAT).

To learn more about TriangleDB spyware, visit Securelist.com.

Kaspersky researchers have released a special ‘triangle_check’ utility that automatically searches for the malware infection. For a detailed guide on how to check your device, read the blogpost.

Advertisement. Scroll to continue reading.

In order to avoid falling victim to a targeted attack by a known or unknown threat actor, Kaspersky researchers recommend implementing the following measures:

  • For endpoint level detection, investigation, and timely remediation of incidents, use a reliable security solution for businesses, like Kaspersky Unified Monitoring and Analysis Platform (KUMA)
  • Update Microsoft Windows OS and other third-party software as soon as possible and do so regularly
  • Provide your SOC team with access to the latest threat intelligence (TI). Kaspersky Threat Intelligence is a single point of access for the company’s TI, providing it with cyberattack data and insights gathered by Kaspersky spanning over 20 years.
  • Upskill your cybersecurity team to tackle the latest targeted threats with Kaspersky online training developed by GReAT experts
  • As many targeted attacks start with phishing or other social engineering techniques, introduce security awareness training and teach practical skills to your team – for example, through the Kaspersky Automated Security Awareness Platform

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

In 2024, Globe blocked 3,096 child pornography domains or those containing child sexual abuse and exploitation materials (CSAEM), a slight increase from 3,047 domains restricted...

HEADLINES

During a recent webinar on Building Resilience Against Online Scams, hosted by fiber broadband and technology provider Converge ICT Solutions Inc., its Chief Executive...

HEADLINES

In 2024, Kaspersky restructured its Partner Program into four key partner types, recognizing the diverse profiles within its network – from traditional resellers and...

White Papers

The study tested 2,000 UK and US consumers, exposing them to a series of real and deepfake content. The results are alarming: only 0.1%...

HEADLINES

Deepfakes pose significant threats and risks, with nearly half of companies worldwide reporting incidents in 2024, according to industry reports. HONOR’s innovative solution immediately...

HEADLINES

The Philippines’ global ranking for local threats rose from 76th to 66th, highlighting the need for stronger cybersecurity measures.

HEADLINES

Despite 65% having adopted generative artificial intelligence (GenAI capabilities), 89% of IT leaders are concerned that flaws in GenAI cybersecurity tools could put their...

APPS

PSBank is reinforcing its commitment to security through key enhancements to its PSBank Mobile app.

Advertisement