Operation Triangulation: iOS Spyware Steals Keystrokes, Contacts, GPS Location, and More via Fake WhatsApp and Telegram Websites

Operation Triangulation: iOS Spyware Steals Keystrokes, Contacts, GPS Location, and More via Fake WhatsApp and Telegram Websites

cybersecurity company added that the malware is capable of stealing a wide range of data, including:

– Keystrokes
– Contacts
– GPS location
– WhatsApp and Viber messages
– Text messages
– Photos and videos

It can also record audio when the victim is making a call or when a specific location is reached.

According to Kaspersky, Operation Triangulation has been active since May 2019 and could have targeted thousands of victims worldwide, with most of them being located in the Middle East.

The spyware, dubbed “sneaky little brother” by Kaspersky, is delivered via fake WhatsApp and Telegram websites that are used to lure victims into downloading a mobile configuration file (MCF).

Once the spyware is installed, it’s difficult to detect as “it doesn’t use typical persistence techniques, nor does its code resemble any well-known malware families,” said Kaspersky.

Overall, while Kaspersky hasn’t named the attackers behind Operation Triangulation, it’s believed that the campaign comes from a “sophisticated actor” or an advanced persistent threat (APT) group that’s interested in gathering valuable data from individuals and organizations.

In conclusion, Kaspersky has uncovered an insidious piece of spyware that’s capable of stealing a vast amount of data from iOS devices. The spyware, which is delivered via fake WhatsApp and Telegram websites, has been in operation since May 2019 and has targeted thousands of victims worldwide. While it’s difficult to detect and remove, victims should remain vigilant and avoid downloading files from untrusted sources.Original Article: https://thehackernews.com/2023/06/new-report-exposes-operation.html


0

Your Cart Is Empty

No products in the cart.