How hackers used iMessage to attack iPhone users

Share via:

Researchers discovered a vulnerability in Apple SoC used to target iPhones running on iOS versions up to iOS 16.6. The hackers initiated 0-click iMessage attacks, bypassing hardware-based security protections and gaining complete control over the devices. The flaw in the SoC played a critical role in the Operation Triangulation attacks, allowing access to user data. The researchers found an unknown hardware feature, possibly for debugging or testing, that enabled the bypass. Extensive reverse engineering and analysis of Memory-Mapped I/O (MMIO) addresses were used to detect and understand the vulnerability.

Disclaimer

We strive to uphold the highest ethical standards in all of our reporting and coverage. We StartupNews.fyi want to be transparent with our readers about any potential conflicts of interest that may arise in our work. It’s possible that some of the investors we feature may have connections to other businesses, including competitors or companies we write about. However, we want to assure our readers that this will not have any impact on the integrity or impartiality of our reporting. We are committed to delivering accurate, unbiased news and information to our audience, and we will continue to uphold our ethics and principles in all of our work. Thank you for your trust and support.

Popular

More Like this

How hackers used iMessage to attack iPhone users

Researchers discovered a vulnerability in Apple SoC used to target iPhones running on iOS versions up to iOS 16.6. The hackers initiated 0-click iMessage attacks, bypassing hardware-based security protections and gaining complete control over the devices. The flaw in the SoC played a critical role in the Operation Triangulation attacks, allowing access to user data. The researchers found an unknown hardware feature, possibly for debugging or testing, that enabled the bypass. Extensive reverse engineering and analysis of Memory-Mapped I/O (MMIO) addresses were used to detect and understand the vulnerability.

Disclaimer

We strive to uphold the highest ethical standards in all of our reporting and coverage. We StartupNews.fyi want to be transparent with our readers about any potential conflicts of interest that may arise in our work. It’s possible that some of the investors we feature may have connections to other businesses, including competitors or companies we write about. However, we want to assure our readers that this will not have any impact on the integrity or impartiality of our reporting. We are committed to delivering accurate, unbiased news and information to our audience, and we will continue to uphold our ethics and principles in all of our work. Thank you for your trust and support.

Website Upgradation is going on for any glitch kindly connect at office@startupnews.fyi

More like this

2 days left to save up to $210 on...

Time is almost up! Regular bird pricing for...

Internet partially restored in Iran: UK-based watchdog

Internet service was partially restored in Iran on...

Popular

Upcoming Events

iptv account iptv account iptv account iptv account iptv account iptv account iptv account iptv account iptv account iptv account iptv account iptv account iptv account iptv account iptv account iptv account iptv account iptv account iptv account iptv account iptv account iptv account iptv account iptv account iptv account iptv account iptv account iptv account iptv account iptv account iptv account iptv account iptv account iptv account iptv account iptv account iptv account iptv account iptv account iptv account iptv account iptv account iptv account iptv account iptv account