Eugene Kaspersky Profile picture
Jun 1 7 tweets 3 min read Twitter logo Read on Twitter
We've discovered a new cyberattack against iOS called Triangulation.

The attack starts with iMessage with a malicious attachment, which, using a number of vulnerabilities in iOS installs spyware. No user action is required.

#IOSTriangulation Image
Triangulation transmits private information to remote servers: microphone recordings, photos from instant messengers, geolocation and data about a number of other activities #IOSTriangulation
The spyware managed to infect several dozen iPhones of our employees. Thanks to the measures taken, the company is operating normally, business processes and user data are not affected, and the threat has been neutralized. We continue to protect you, as always #IOSTriangulation
We are quite confident that Kaspersky was not the main target of this cyberattack. The coming days will bring more clarity and further details on the worldwide proliferation of the spyware #IOSTriangulation
This report is the beginning of the investigation of this sophisticated attack. Today we publish the first results of the analysis, but there is still a lot of work ahead. More details (incl. indicators or compromise and disinfection) kas.pr/m66k #IOSTriangulation
Important: The activity observed in Operation Triangulation does not overlap with already known iOS campaigns, such as Pegasus, Predator or Reign.
Important: Disabling iMessage would prevent iOS devices from Triangulation attack

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Eugene Kaspersky

Eugene Kaspersky Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @e_kaspersky

May 31
BrutePrint: bypassing smartphone fingerprint protection

#Android fingerprint protection isn’t that reliable after all: it can be brute-forced even without a copy of your fingerprint 👉 kas.pr/w4jo Image
To stay protected:

✅ Register as few fingerprints as possible (ideally just one)
✅ Don’t forget to use an extra PIN
✅ Use separate passwords for any of your apps
Image
Read 4 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(