Google Finds ‘Indiscriminate iPhone Attack Lasting Years’

Security researchers at Google have found evidence of a “sustained effort” to hack iPhones over a period of at least two years.The attack was said to be carried out using websites which would discreetly implant malicious software to gather contacts, images and other data. Google’s analysis suggested the booby-trapped websites were said to have been visited thousands of times per week, the BBC reported.


EXPERTS COMMENTS
John Aisien, CEO,  Blue Cedar
September 02, 2019
Companies should be responsible for immunizing their applications to prevent potential devastation.
Mobile device security has historically been a slow-moving and often frustrating undertaking, but the result has created spikes in mobile device weaponization like the news we saw today. This raises profound concern about the security of the devices we carry around on an everyday basis, and which we increasingly use to access and process both personal and corporate data. By hacking into popular mo ....
[Read More >>]
Usman Rahim, Digital Security and Operations Manager,  The Media Trust
September 02, 2019
The notion that only you can access your device is far from the truth.
The identification of these exploits targeting iOS devices prove that even products designed from the ground up to protect your privacy aren’t 100% secure. The notion that only you can access your device is far from the truth. Your device and the apps that run on it are supported by many third-parties who can potentially access your behavioral and personal information, from how many steps you ....
[Read More >>]
Joseph Carson, Thycotic,  Chief Security Scientist
August 30, 2019
What is surprising as well is why Google has not called out the websites but instead pointed to the vulnerabilities.
Ironically this is not limited to just iPhone’s and many websites exist that are trying to implant malware into all vendors mobile devices to steal data or gain persistent access. What is surprising here is that they are using zero days and, in my experience, cyber criminals nor nation states will waste zero days on limited opportunistic cyberattacks. This typically means that such cyberat ....
[Read More >>]
Jake Moore, Cybersecurity Specialist,  ESET
August 30, 2019
This just highlights how important it is to keep your devices updated to the latest iOS.
This just highlights how important it is to keep your devices updated to the latest iOS. Threat actors will not stop at anything to try and exploit Apple’s operating system where they can. Not only would such inconvenience or even malware have such a damaging effect to Apple and its users, cybercriminals around the world see breaking Apple’s ecosystem as a sort of a pinnacle of their ‘career ....
[Read More >>]
Adrian Taylor, CTO,  ITC Secure
August 30, 2019
The best action users can take is to make sure their iOS devices are up to date with the latest patches from Apple.
This is an interesting piece of research and it confirms what many have long suspected – that sophisticated attack chains targeted at iOS are being constantly developed, and sooner or later there will be a big problem for Apple users. However, let’s not panic just yet: If this set of exploits is working in the wild this research has not found any evidence of it and, in fact, as the Google t ....
[Read More >>]
Boris Cipot, Senior Sales Engineer ,  Synopsys
August 30, 2019
The level of complexity in today’s software development and the developed functionalities alone bring a certain risk factor.
For a long time, there was a myth that iOS and OSX are secure operating systems and don't need any security systems like anti-malware to protect them. We have seen in some cases that apple systems were breached, but those were mostly breaches to iCloud and similar. This last attack example just shows that there is no such thing as a completely secure operating system. Apple surely did a good job ....
[Read More >>]

If you are an expert on this topic:

Submit Your Expert Comments


In this article