SoatDev IT Consulting
SoatDev IT Consulting
  • About us
  • Expertise
  • Services
  • How it works
  • Contact Us
  • News
  • January 12, 2024
  • Rss Fetcher

A previously unknown hardware feature in Apple iPhones, pivotal in the Operation Triangulation campaign was recently exposed. The feature was exposed by Kaspersky’s Global Research and Analysis Team (GReAT), at the 37th Chaos Communication Congress in Hamburg.
Kaspersky’s research team disclosed that this is one of the most sophisticated attack chain they have witnessed to date.
The vulnerability of the Apple System was discovered on a chip, or SoC, that has played a critical role in the recent iPhone attacks known as “Operation Triangulation”, allowing attackers to bypass the hardware-based memory protection on iPhones running iOS versions up to iOS 16.6.
“Operation Triangulation” is an Advanced Persistent Threat (APT) campaign targeting iOS devices. This sophisticated campaign employs zero-click and exploits distributed via iMessage, which then allows attackers to gain complete control over the targeted device and access user data.
Apple responded to the attacks, by releasing security updates to address four zero-day vulnerabilities: CVE-2023-32434, CVE-2023-32435, CVE-2023-38606, and CVE-2023-41990.
These vulnerabilities impact a broad spectrum of Apple products, including iPhones, iPods, iPads, macOS devices, Apple TV, and Apple Watch.
The discovered vulnerability is a hardware feature, possibly based on the principle of of “security through obscurity”, and may have been intended for testing or debugging.
Following the initial 0-Click iMessage attack and subsequent privilege escalation, it was found that the attackers leveraged this hardware feature to bypass hardware-based security protections and manipulate the contents of protected memory regions. This was found to be a crucial step to obtaining full control over the device. Apple addressed the issue, identified as CVE-2023-38606.
Because the feature was not publicly documented, it presented a significant challenge in its detection and analysis using conventional security methods.
Boris Larin, Principal Security Researcher at Kaspersky’s GReAT, explains, “This is no ordinary vulnerability. Due to the closed nature of the iOS ecosystem, the discovery process was both challenging and time-consuming, requiring a comprehensive understanding of both hardware and software architectures.
“What this discovery teaches us once again is that even advanced hardware-based protections can be rendered ineffective in the face of sophisticated attacker, particularly when there are hardware features allowing to bypass these protections.”
 

Previous Post
Next Post

Recent Posts

  • Cursor’s Anysphere nabs $9.9B valuation, soars past $500M ARR
  • Circle IPO soars, giving hope to more startups waiting to go public
  • Why are Elon Musk and Donald Trump fighting?
  • Europe will have to be more Tenacious to land its first rover on the Moon
  • Elon Musk and Donald Trump are smack talking each other into their own digital echo chambers

Categories

  • Industry News
  • Programming
  • RSS Fetched Articles
  • Uncategorized

Archives

  • June 2025
  • May 2025
  • April 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023

Tap into the power of Microservices, MVC Architecture, Cloud, Containers, UML, and Scrum methodologies to bolster your project planning, execution, and application development processes.

Solutions

  • IT Consultation
  • Agile Transformation
  • Software Development
  • DevOps & CI/CD

Regions Covered

  • Montreal
  • New York
  • Paris
  • Mauritius
  • Abidjan
  • Dakar

Subscribe to Newsletter

Join our monthly newsletter subscribers to get the latest news and insights.

© Copyright 2023. All Rights Reserved by Soatdev IT Consulting Inc.