Start your day with intelligence. Get The OODA Daily Pulse.

Home > Briefs > Cyber > Stealth Techniques Used in ‘Operation Triangulation’ iOS Attack Dissected

Stealth Techniques Used in ‘Operation Triangulation’ iOS Attack Dissected

The iOS zero-click attacks that targeted iPhones of Kaspersky senior employees earlier this year, known as ‘Operation Triangulation’, focused heavily on stealth. The attacks used malicious iMessage attachments designed to exploit a zero-day vulnerability and deploy spyware. The threat actors implemented multiple techniques to avoid detection, including the use of validators in the infection chain, deleting traces of the attack, and having a microphone-recording module that could stop when the device’s screen was in use. This level of care taken by the threat actors highlights the importance of exercising stealth in advanced cyberattacks.

Read more: https://www.securityweek.com/stealth-techniques-used-in-operation-triangulation-ios-attack-dissected/