
Infection occurs without any interaction with the message from users, and runs in system memory. The implanted spyware, named TriangleDB will then perform data collection and monitoring. — Photo by William Hook on Unsplash
Apple has released a security fix for devices running iOS 15 that removes a vulnerability allowing hackers to deploy spyware via an iMessage attachment.
iPhone users on iOS 15.7 and below should make sure to update their device with the latest security fix on version 15.7.7 to avoid being exposed to attacks.
Models of the iPhone that have not received a feature update past iOS 15 include the iPhone 6s, iPhone 6s Plus, iPhone 7, iPhone 7 Plus, and first-generation iPhone SE.
ALSO READ: You really need to update your iPhone. Here’s how.
The exploit was first discovered by cybersecurity firm Kaspersky Lab, who dubbed the cyberattack campaign “Operation Triangulation”.
Making use of a zero-click exploit (a vulnerability that lets hackers remotely execute code) in iMessage, spyware infects iOS devices using a malicious attachment sent via a message.
ALSO READ: ‘Zero-click’ hacks are growing in popularity. There’s practically no way to stop them
The message and attachment is then deleted once the spyware is deployed.
Infection occurs without any interaction with the message from users, and runs in system memory. The implanted spyware, named TriangleDB will then perform data collection and monitoring.
ALSO READ: How a Saudi woman’s iPhone revealed hacking around the world
As TriangleDB only runs in the device's memory, if the smartphone is restarted all traces of the spyware will disappear, requiring the attacker to reinfect it with another message and attachment.
Kaspersky claims that TriangleDB has 24 commands, including extracting passwords from Keychain, location monitoring, along with the ability to access, modify, remove, and create files on the device.
The company also says that it is likely a similar implant could be used to target devices running MacOS.