Kaspersky researchers have uncovered an ongoing mobile advanced persistent threat (APT) campaign targeting iOS devices with previously unknown malware.Dubbed ‘Operation Triangulation’, the campaign distributes zero-click exploits via iMessage to run malware gaining complete control over the device and user data, with the final goal to hiddenly spy on users.
The mobile APT campaign was uncovered while Kaspersky was monitoring the network traffic of its corporate WiFi network using the Kaspersky Unified Monitoring and Analysis Platform (KUMA). Upon further analysis, company researchers discovered the threat actor has been targeting iOS devices of dozens of company employees.
The investigation of the attack technique is still ongoing, but so far researchers have been able to identify the general infection sequence. The victim received a message via iMessage with an attachment containing a zero-click exploit. Without any further interaction, the message triggered a vulnerability that led to code execution for privilege escalation and provided full control over the infected device. Once the attacker successfully established its presence in the device, the message was automatically deleted.
In addition, the spyware quietly transmitted private information to remote servers: including microphone recordings, photos from instant messengers, geolocation and data about a number of other activities of the owner of the infected device.
During the analysis, it was confirmed that there was no impact on the company’s products, technologies and services, and no Kaspersky customer user data or critical company processes were affected. The attackers could only access data stored on the infected devices.
APT actors are constantly evolving
Although not certain, it is believed that the attack was not targeted specifically at Kaspersky. The following days will likely bring more clarity about the global exposure of this cyberattack.
“When it comes to cybersecurity, even the most secure operating systems can be compromised, comments Igor Kuznetsov, head of the EEMEA unit at Kaspersky Global Research and Analysis Team (GReAT). “As APT actors are constantly evolving their tactics and searching for new weaknesses to exploit, businesses must prioritise security of their systems.
“This involves prioritising employee education and awareness, and providing them with the latest threat intelligence and tools to effectively recognise and defend against potential threats. Our investigation of the Triangulation operation continues. We expect further details on it to be shared soon, as there can be targets of this spy operation outside Kaspersky.”