Tuesday, October 27, 23:38
Home security A group of malicious sites have been hacking iPhone for years

A group of malicious sites have been hacking iPhone for years


Her researchers Google have discovered a group of sites that have been secretly infiltrating the site for the last two years iPhone devices.

The analysts of the department Project Zero Google posted one blog post on Thursday night, detailing their findings.

"There was no discreet targeting, just a visit to the infected site was enough to server "If it was successful, it would install a monitoring implant," writes security researcher Ian Beer in a blog post. Once inserted into the iPhone, this implant is able to steal messages, photos and location data in real time.

The publication does not specify how many of these sites are, but researchers estimate that each receives thousands of visits on a weekly basis. The hacks targeted from iOS 10 to iOS 12, which according to Beer shows that there is a "constant effort" to hack iPhones over a period of two years.

Websites accessed iPhones through five methods or "chains". The researchers found 14 distinct vulnerabilities that made these chains possible. Seven of these vulnerabilities were found in Safari, which is the default browser for iPhone devices.

The researchers reported to Apple their findings in February and gave the company a seven-day deadline to correct the vulnerabilities. Six days later, Apple updated the security software on iOS 12. Google has given Apple a much tighter deadline than usual, as the rule is 90 days to fix such issues.

Apple has generally acquired a rumor about the safety of its devices, and earlier this month the company raised the amount of money it would pay in a bug bounty, to $ 1 million.


Please enter your comment!
Please enter your name here

Absent Mia
Absent Miahttps://www.secnews.gr
Being your self, in a world that constantly tries to change you, is your greatest achievement



Data breach in a law firm exposes data of Google employees

Immigration law firm Fragomen, Del Rey, Bernsen & Loewy, LLP revealed that it suffered a data breach that led to the leakage of personal data ...

How to install a .watchface file on Apple Watch

The Apple Watch lets you customize the faces of the watch to display all kinds of useful information. But did you know ...

The five biggest data breaches of the 21st century

Data is becoming more and more sought after as our daily lives become more digitized. The technology giants that monopolize data are ...

Microsoft is limiting the availability of Windows 10 20H2

Microsoft is currently restricting the availability of Windows 10 20H2 to provide all users who want to ...

How to enable the new Chrome Read more feature

The latest version of Google Chrome browser, v86, released earlier this month, contains a secret feature called Read ...

How to choose a custom color for the Start menu

Starting with the October 2020 update, Windows 10 is the default on a theme that removes bright colors from ...

NASA telescope discovers drinking water on the moon

Eleven years ago, a spacecraft changed our view of the moon forever. The data collected by ...

Microsoft: Enhances password spray attack detection capabilities

Microsoft has significantly improved the ability to detect password spray attacks in the Azure Active Directory (Azure AD) and has reached the point ...

How to prevent companies from finding our phone number

In the age of advertising, the more user information is known the more convenient it is for companies. And in particular, the ...

Violation in a psychotherapy clinic led to blackmail of patients

Two years ago, a cyber attack took place in a Finnish psychotherapy clinic, which resulted in data theft and ransom demand. Now,...