[a / b / c / d / e / f / g / gif / h / hr / k / m / o / p / r / s / t / u / v / vg / vm / vmg / vr / vrpg / vst / w / wg] [i / ic] [r9k / s4s / vip / qa] [cm / hm / lgbt / y] [3 / aco / adv / an / bant / biz / cgl / ck / co / diy / fa / fit / gd / hc / his / int / jp / lit / mlp / mu / n / news / out / po / pol / pw / qst / sci / soc / sp / tg / toy / trv / tv / vp / vt / wsg / wsr / x / xs] [Settings] [Search] [Mobile] [Home]
Board
Settings Mobile Home
/g/ - Technology


Thread archived.
You cannot reply anymore.


[Advertise on 4chan]


File: 935485845908345.png (707 KB, 1298x804)
707 KB
707 KB PNG
https://www.wired.com/story/apple-iphone-spyware-101/#intcid=_wired-verso-hp-trending_da06417e-2334-45fc-a024-fd5be79f4b22_popular4-1

https://archive.is/WqIBp

The iPhone maker has detected spyware attacks against people in more than 150 countries. Knowing if your device is infected can be tricky—but there are a few steps you can take to protect yourself.

Zero-Click Attacks

Spyware gives attackers access to the smartphone’s mic and allows them to view everything you write, including messages on encrypted apps such as WhatsApp and Signal. They can also track your location, collect passwords, and harvest information from apps.

In the past, spyware was delivered via phishing, requiring the victim to click on a link or download an image. Today, it can be delivered in so-called “zero-click attacks” via an iMessage or WhatsApp image that will automatically plant spyware on your device.

In 2021, researchers at Google’s Project Zero detailed how an iMessage-based zero-click exploit was used to target a Saudi activist. “Short of not using a device, there is no way to prevent exploitation by a zero-click exploit; it's a weapon against which there is no defense,” the researchers warned.

The spyware infection chain using zero-click exploits via iMessage was demonstrated by security outfit Kaspersky as part of its Operation Triangulation research last year.

All that needs to happen is, the victim receives an iMessage with an attachment containing a zero-click exploit. “Without any further interaction, the message triggers a vulnerability, leading to code execution for privilege escalation and providing full control over the infected device,” says Boris Larin, principal security researcher at Kaspersky's Global Research & Analysis Team.

Once the attacker establishes their presence on the device, he says, the message is automatically deleted.
>>
iToddler status?
>>
>>100363638
buck broken
>>
And yet you still can't run a compiler on it and run your own code.
It's the gayest possible computer.
>>
File: IMG_2683.jpg (294 KB, 1170x1239)
294 KB
294 KB JPG
>>100363159
>imessage
does anyone even use that outside of the US lol
>>
>>100363159
>spyware
>#intcid=_wired-verso-hp-trending_da06417e-2334-45fc-a024-fd5be79f4b22_popular4-1
Ironic
>>
File: 1713730348044066.gif (354 KB, 500x491)
354 KB
354 KB GIF
iTODDLERS BTFO
>>
>>100363159
>spyware
isn't this just an iOS feature?
>>
>>100365654
baste
>>
>>100365654
basado
>>
File: 1663566956620794.png (399 KB, 512x512)
399 KB
399 KB PNG
>>100365654
>>
>>100364094
I always thought that only amerimuts could fall for that
>>
>>100364094
Piece of shit app. Glad non US peeps know how to use third party ones. >>100365654
brazzer
>>
>>100363159
>iPhone maker has detected spyware
>detected spyware
>detected
it was their officially designated backdoor and now that's in the open, apple's acting surprised and like they're doing stuff
>>
>>100370190
>apple's acting surprised and like they're doing stuff
worse happened when some researchers found secret debugging registers that acted as a backdoor in the m series chips that completely bypassed memory protection. apple said nothing. mainstream media said nothing. it was discovered via malware spread by jews. since it's a hardware issue then apple can only do so much on the software side so millions of m1 and m2 machines are still exploitable.
>>
>>100363159
Why Apple users would care when Apple sells user data illegally to third parties? They just pay 200 million dollars and make 600 million profit after that. Microsoft, Google, Amazon etc. just literally tell you what data they get and use but Apple is only one ILLEGALLY getting the data and SELLING it to random companies to China and Russia.

Apple uses that money to make that "iPhone = privacy" propaganda and it apparently works because Apple users and anons here are so stupid.
>>
>>100363159
The zero click attacks are especially tailored for the target and it costs millions of dollars to develop.
If they used it for everyone else just to harvest data then it will be patched by apple the next day because of too many reports and incidents.
The "spyware" is a problem only because it is being targeted to special people only and apple takes time to patch it. And they do get patches, this is how governments waste billions to spy on special interests.
And these spywares are mostly developed by israeli companies.
>>
File: 1636372167556.gif (343 KB, 500x491)
343 KB
343 KB GIF
>>100363159
>muh Isafety™
>>
>>100363159
android has 10x the bugs and spyware. just that that’s what you expect when buying trash so nobody talks about it
>>
>2004
>"Never download a mail attachment if you don't know from who or where it comes from!"
>2024
>the OS built-in software automatically download and execute random attachments itself because of User Experience™
What went wrong?
>>
>>100371743
baseline customer became so retarded that you're not allowed to choose anymore, if you use the goyslop of tech
>>
>>100371739
>target has iPhone
>use true and tested spyware
>target has rama llama ding dong phone
>try 50 different spywares and hope one works
>>
>>100365654
brazzers
>>
>>100365654
>consumer babies who don't run a business and only have their one device for "personal use"
lmao
you would be working for me if I didn't throw all pajeet cvs in the trash
>>
>>100365654
see >>100371739
>>
>>100365654
bazinga
>>
>>100370517
>worse happened when some researchers found secret debugging registers that acted as a backdoor in the m series chips that completely bypassed memory protection
could you spoonfeed me on that?
>>
>>100365654
>i.... "toddler"
>posts a weeb gif
lol. opinion discarded
>>
File: file.png (202 KB, 870x931)
202 KB
202 KB PNG
>>100372366
https://arstechnica.com/security/2023/12/exploit-used-in-mass-iphone-infection-campaign-targeted-secret-hardware-feature/2/
>>
File: 1690085433700745.jpg (92 KB, 600x885)
92 KB
92 KB JPG
let us have a backdoor
it will only be we that use it after all
there is no legitimate reason for us to not have a backdoor
you don't have anything to hide, do you?
>>
>>100371504
>Why Apple users would care when Apple sells user data illegally to third parties? They just pay 200 million dollars and make 600 million profit after that. Microsoft, Google, Amazon etc. just literally tell you what data they get and use but Apple is only one ILLEGALLY getting the data and SELLING it to random companies to China and Russia.
Proof?
>inb4 they only do it to 'murricans
>>
>>100363159
where's the exploit where the person just *thinks* about hacking the other person's phone and it happens
cause it's out there already
>>
>>100365654
bahamas
>>
>>100373404
elaborate?
>>
File: 1367954273572.jpg (71 KB, 400x400)
71 KB
71 KB JPG
>>100363159
>#intcid=_wired-verso-hp-trending_da06417e-2334-45fc-a024-fd5be79f4b22_popular4-1
>>
>>100374539
yes i know, which is why i gave you an archive link.
>>
>>100369820
>my country is based because we use whatsapp
>>
>>100363159
The title made me think the intended firmspyware was getting worse, and left me hoping EU would ream Apple's ass again.
You've left me disappointed OP
>>100373404
I am that exploit. When I go fix someone's phone it magically works again. It's a very short-term hack however, gets completely flushed out of system memory in anywhere between half an hour and a week.
>>
>>100371823
>can be accomplished with two Android phones
see also >>100371778
>>
>>100372905
>kaspersky
ah you mean the company who was dns poisoning your queries if you installed their own antivirus spyware?



[Advertise on 4chan]

Delete Post: [File Only] Style:
[Disable Mobile View / Use Desktop Site]

[Enable Mobile View / Use Mobile Site]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.