Friday, January 10, 2025
HomeAppleGoogle Found 5 iOS Exploit Chain Via Hacked Websites to Remotely Hack...

Google Found 5 iOS Exploit Chain Via Hacked Websites to Remotely Hack Your iPhone If You Just Visting the Site

Published on

Researchers from Google Project Zero team uncovered a five dangerous iOS exploit chain in wide that can hack almost every iPhone running with iOS 10 to 12 by just trick them to visit the hacked website.

An unknown hacking group targeting iPhone using by implants this exploit chain over 2 years through various hacked websites.

Google’s Threat Analysis Group (TAG) discovered a collection of hacked websites which is used to attack the iPhone user with iOS exploit by using watering hole attacks against visitors.

Attackers not playing any tough game with website visitors, but just simply visiting the hacked site was enough for the exploit server to attack your device and the successful attack will lead to installing the further implant to monitor your devices.

These 5 iOS exploit chain developed for 14 different vulnerabilities, in which, seven for the iPhone’s web browser, five for the kernel and two separate sandbox escapes vulnerability.

iOS Exploit Chain
Source: Google

Based on the Project zero team analysis, these implants developed to steal private data like iMessages, photos and GPS location in real-time from compromised iPhone.

During the process of analysing these exploits, Google researchers uncovered 2 zero-day vulnerabilities that was unpatched and attackers actively exploited these vulnerabilities.

Google reported this 2 zero-day bug on Feb 1, 2019, to Apple with 7 days deadline to fix the issue which leads Apple to released iOS 12.1.4 and same GBHackers on security published an alert update for an Apple community and warned to apply the patch.

These 0day’s are exploiting the memory corruption vulnerability and an ability to execute arbitrary code with kernel privileges in iOS, and another zero-day flow allows gaining elevated privileges.

Ian Beer from Project zero has elaborately described with a detailed write-ups of all five privilege escalation exploit chains including a demo of the implant running on my own devices.

  1. iOS Exploit Chain #1
  2. iOS Exploit Chain #2
  3. iOS Exploit Chain #3
  4. iOS Exploit Chain #4
  5. iOS Exploit Chain #5
  6. JSC Exploits
  7. Implant Teardown

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and Hacking News update.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

QSC: Multi-Plugin Malware Framework Installs Backdoor on Windows

The QSC Loader service DLL named "loader.dll" leverages two distinct methods to obtain the...

Weaponized LDAP Exploit Deploys Information-Stealing Malware

Cybercriminals are exploiting the recent critical LDAP vulnerabilities (CVE-2024-49112 and CVE-2024-49113) by distributing fake...

New NonEuclid RAT Evades Antivirus and Encrypts Critical Files

A NonEuclid sophisticated C# Remote Access Trojan (RAT) designed for the.NET Framework 4.8 has...

Hackers Targeting Users Who Lodged Complaints On Government portal To Steal Credit Card Data

Fraudsters in the Middle East are exploiting a vulnerability in the government services portal....

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

iPhone Sharing the Photos by Default to Apple

A recent blog post by developer Jeff Johnson has brought to light a new...

Apple Agrees to $95M Settlement Over Siri Privacy Lawsuit

Apple Inc. has agreed to pay $95 million to settle a proposed class-action lawsuit...

Apple Safari JavaScriptCore Remote Code Execution Flaw Exploited in the Wild

A critical vulnerability identified as CVE-2024-44308 has been actively exploited in the wild, affecting...