WASHINGTON: Google security experts uncovered an “indiscriminate” hacking operation that targeted iPhones over a period of at least two years and used websites to implant malicious software to access photos, user locations and other data.
In a post Thursday on the blog of Google’s Project Zero security taskforce, cyber experts did not name the hacked websites hosting the attacks, but estimated they received thousands of visitors a week.
“Simply visiting the hacked site was enough for the exploit server to attack your device, and if it was successful, install a monitoring implant,” said Project Zero’s Ian Beer.
Once installed, the malicious software “primarily focused on stealing files and uploading live location data,” Beer said, adding it had been able to access encrypted messenger apps like Telegram, WhatsApp and iMessage.
Google hangouts and Gmail had also been affected, he added in the post, which provided a detailed breakdown of how the malicious software targeted and exploited iPhone vulnerabilities.
Most of the vulnerabilities targeted were found in the iPhone’s default Safari web browser, Beer said, adding that the Project Zero team had discovered them in almost every operating system from iOS 10 through to the current iOS 12 version.
Once embedded in a user’s iPhone, the malicious software sent back stolen data, including live user location data back to a “command and control server” every 60 seconds.
Beer said Google had informed Apple of the attacks in February, and Apple subsequently released a security patch for the iOS 12.1.
Long the driver of Apple’s money-making machine, iPhone revenue overall was down 12 percent from last year to $26 billion.
The tech giant sent out invitations on Thursday to a September event at its Silicon Valley campus where it is expected to unveil a new-generation iPhone.
Google reveals years-long ‘indiscriminate’ iPhone hack
Google reveals years-long ‘indiscriminate’ iPhone hack
- Most of the vulnerabilities targeted were found in the iPhone’s default Safari web browser
- Once embedded in a user’s iPhone, the malicious software sent back stolen data
Hezbollah says Israeli strike killed Al-Manar TV presenter in southern Lebanon
- The Israeli military said later on Monday that Al-Din was a Hezbollah militant who recently worked to rehabilitate the group’s artillery capabilities in southern Lebanon
The Lebanese armed group Hezbollah said on Monday that an Israeli strike in the country’s south killed TV presenter Ali Nour Al-Din, who worked for the group’s affiliated Al-Manar television station.
The group said the killing portends “the danger of Israel’s extended escalations (in Lebanon) to include the media community.”
The Israeli military said later on Monday that Al-Din was a Hezbollah militant who recently worked to rehabilitate the group’s artillery capabilities in southern Lebanon.
Israel and Lebanon agreed to a US-brokered ceasefire in 2024 to end more than a year of fighting between Israel and Hezbollah, which culminated in Israeli strikes that severely weakened the Iran-backed militant group. Since then, the sides have traded accusations over ceasefire violations.
Lebanon has faced growing pressure from the US and Israel to disarm Hezbollah. The group’s leaders fear that Israel could dramatically escalate strikes across the battered country, aiming to push the Lebanese government for quicker action to confiscate Hezbollah’s arsenal.










