Mobile & Wireless

Kaspersky Dissects Spyware Used in iOS Zero-Click Attacks

Russian anti-malware vendor shares technical details on spyware implant deployed as part of recent zero-click iMessage attacks.

Russian anti-malware vendor Kaspersky has analyzed the spyware implant deployed as part of recent zero-click iMessage attack that targeted iOS-powered devices in its corporate network.

Referred to as Operation Triangulation, Kaspersky said the campaign targeted several dozen iPhones belonging to senior employees via iMessages carrying a malicious attachment containing an exploit for a remote code execution (RCE) vulnerability.

The exploit code also downloads additional components to obtain root privileges on the target device, after which a spyware implant that Kaspersky dubbed TriangleDB is deployed in memory and the initial iMessage is deleted.

The implant does not feature a persistence mechanism, and, if the target device is rebooted, the entire exploitation chain needs to be launched again for re-infection.

“If no reboot occurs, the implant will automatically uninstall itself after 30 days, unless the attackers extend this period,” Kaspersky added.

Written in Objective-C, the TriangleDB implant communicates with its command-and-control (C&C) server using the Protobuf library for data exchange. Messages are encrypted using symmetric (3DES) and asymmetric (RSA) cryptography and are transmitted over HTTPS, in POST requests.

TriangleDB periodically sends heartbeat messages to the C&C server, which responds with commands transferred as Protobuf messages with obscure type names.

Kaspersky’s analysis identified 24 supported commands related to file interaction, process interaction, keychain dumps (likely for harvesting credentials), geolocation monitoring, and the execution of additional modules in the form of Mach-O executables.

Advertisement. Scroll to continue reading.

The spyware monitors the device for folder changes to identify modified files that have names matching specified regular expressions and queues the identified files for exfiltration.

The Kaspersky documentation also identified artifacts suggesting that the threat actor behind the campaign might also be targeting macOS devices with a similar implant.

Kaspersky disclosed the iOS zero-click attacks against its network on the same day that Russia’s Federal Security Service (FSB) blamed US intelligence agencies, specifically the NSA, for a spy campaign targeting thousands of iOS devices belonging to local users and foreign diplomatic missions.

Related: Russia Blames US Intelligence for iOS Zero-Click Attacks

Related: NSO Group Used at Least 3 iOS Zero-Click Exploits in 2022: Citizen Lab

Related: Details Emerge on Israeli Spyware Vendor QuaDream and Its iOS Malware

Related: Apple Rolls Out Zero-Day Patches to Older iOS, macOS Devices

Related Content

Vulnerabilities

Apple has released iOS 17.4.1 and macOS Sonoma 14.4.1 with patches for an arbitrary code execution vulnerability.

Data Protection

Researchers detail GoFetch, a new side-channel attack impacting Apple CPUs that could allow an attacker to obtain secret keys.

Mobile & Wireless

Apple is opening small cracks in the iPhone’s digital fortress as part of a regulatory clampdown in Europe— at the risk of creating new...

Vulnerabilities

High-severity vulnerability in Apple Shortcuts could lead to sensitive information leak without user’s knowledge.

Data Protection

Apple unveils PQ3, a new post-quantum cryptographic protocol for iMessage designed to protect communications against quantum computing attacks.

Vulnerabilities

Apple’s latest Magic Keyboard firmware addresses a recently disclosed Bluetooth keyboard injection vulnerability.

Mobile & Wireless

Chinese state-backed experts have found a way to identify people who use Apple's encrypted AirDrop messaging service, according to the Beijing municipal government.

Mobile & Wireless

iOS zero-click attack targeting Kaspersky iPhones bypassed hardware-based security protections to take over devices.

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version