Friday, September 13, 2024
HomeAppleGoogle Found 5 iOS Exploit Chain Via Hacked Websites to Remotely Hack...

Google Found 5 iOS Exploit Chain Via Hacked Websites to Remotely Hack Your iPhone If You Just Visting the Site

Published on

Researchers from Google Project Zero team uncovered a five dangerous iOS exploit chain in wide that can hack almost every iPhone running with iOS 10 to 12 by just trick them to visit the hacked website.

An unknown hacking group targeting iPhone using by implants this exploit chain over 2 years through various hacked websites.

Google’s Threat Analysis Group (TAG) discovered a collection of hacked websites which is used to attack the iPhone user with iOS exploit by using watering hole attacks against visitors.

- Advertisement - EHA

Attackers not playing any tough game with website visitors, but just simply visiting the hacked site was enough for the exploit server to attack your device and the successful attack will lead to installing the further implant to monitor your devices.

These 5 iOS exploit chain developed for 14 different vulnerabilities, in which, seven for the iPhone’s web browser, five for the kernel and two separate sandbox escapes vulnerability.

iOS Exploit Chain
Source: Google

Based on the Project zero team analysis, these implants developed to steal private data like iMessages, photos and GPS location in real-time from compromised iPhone.

During the process of analysing these exploits, Google researchers uncovered 2 zero-day vulnerabilities that was unpatched and attackers actively exploited these vulnerabilities.

Google reported this 2 zero-day bug on Feb 1, 2019, to Apple with 7 days deadline to fix the issue which leads Apple to released iOS 12.1.4 and same GBHackers on security published an alert update for an Apple community and warned to apply the patch.

These 0day’s are exploiting the memory corruption vulnerability and an ability to execute arbitrary code with kernel privileges in iOS, and another zero-day flow allows gaining elevated privileges.

Ian Beer from Project zero has elaborately described with a detailed write-ups of all five privilege escalation exploit chains including a demo of the implant running on my own devices.

  1. iOS Exploit Chain #1
  2. iOS Exploit Chain #2
  3. iOS Exploit Chain #3
  4. iOS Exploit Chain #4
  5. iOS Exploit Chain #5
  6. JSC Exploits
  7. Implant Teardown

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and Hacking News update.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hacker Tricks ChatGPT to Get Details for Making Homemade Bombs

A hacker known as Amadon has reportedly managed to bypass the safety protocols of...

Citrix Workspace App Vulnerable to Privilege Escalation Attacks

Citrix released a security bulletin (CTX691485) detailing two critical vulnerabilities in the Citrix Workspace...

Beware Of Weaponized Excel Document That Delivers Fileless Remcos RAT

A recent advanced malware campaign leverages a phishing attack to deliver a seemingly benign...

Hackers Exploiting Apache OFBiz RCE Vulnerability in the Wild

A critical vulnerability in the Apache OFBiz framework has been actively exploited by hackers....

Free Webinar

Decoding Compliance | What CISOs Need to Know

Non-compliance can result in substantial financial penalties, with average fines reaching up to $4.5 million for GDPR breaches alone.

Join us for an insightful panel discussion with Chandan Pani, CISO - LTIMindtree and Ashish Tandon, Founder & CEO – Indusface, as we explore the multifaceted role of compliance in securing modern enterprises.

Discussion points

The Role of Compliance
The Alphabet Soup of Compliance
Compliance
SaaS and Compliance
Indusface's Approach to Compliance

More like this

Hackers Exploit iOS Settings to Trigger Fake iOS Updates on Hijacked Devices

A sophisticated mobile attack vector involves a deceptive iOS update that masquerades as the...

Apple Tightens macOS Gatekeeper Controls in macOS Sequoia

Apple has announced changes to its macOS Gatekeeper security feature with the release of...

Critical OpenSSH “regreSSHion” Vulnerability Impacted macOS  Systems, Patch Now

A serious flaw in OpenSSH servers, dubbed "regreSSHion," affects macOS systems and could allow...