Cybersecurity firm Kaspersky has unveiled details of a significant zero-click exploit affecting iOS devices, a revelation that raises serious concerns for Apple users. The exploit meticulously utilizes mobile device backups which contain a partial copy of the filesystem, capturing user data and service databases. This intricate setup allows researchers to reconstruct user activity timelines, analogous to traditional digital forensic methodologies.
"Using this timeline, we were able to identify specific artifacts that indicate the compromise," said Kaspersky researchers, detailing their investigative process. The findings outline a troubling infection sequence that kicks off when an unsuspecting iPhone user receives a malicious message via the iMessage service, complete with an exploit-laden attachment.
"Using this timeline, we were able to identify specific artifacts that indicate the compromise,"
Once the exploit is executed, the initial message and its accompanying data are deleted. “After successful exploitation, a final payload is downloaded from the C&C server, that is a fully-featured APT platform,” explained the researchers. This vulnerability allows the attacker to achieve code execution without any user interaction, thereby broadening the potential impact of the attack.

As the research highlights, the exploit does not support persistence, likely due to the constraints of the iOS operating system. The data gathered from multiple devices suggests a pattern of reinfection upon reboot, with traces of these malicious activities dating back to 2019. "As of the time of writing in June 2023, the attack is ongoing, and the most recent version of the devices successfully targeted is iOS 15.7," the researchers noted, underscoring the persistence of this threat.
Despite the alarming nature of these findings, attribution remains elusive. Analyst Vesselin Bontchev commented on interpreter claims made by Russia's FSB, which suggested NSA involvement in the exploit. "The FSB is attributing it to the NSA, ‘working in collaboration with Apple,’ but they are politically motivated and provide no technical evidence, so I wouldn’t put too much faith in this,” he cautioned.
Others remain skeptical about the exploit's source and nature. Clive Robinson pointed out that there have been unverified claims of a kernel issue related to buffer overflow vulnerabilities before Kaspersky's report. "What is reasonably sure is that as far as espionage goes, be it political, economic, or personal, Apple Devices and Apple OS’s are now the targets with the most sought-after exploits.” Robison added the demographic of Apple users likely contributes to this trend.
Robinson did not suggest an immediate switch to different brands but emphasized the inherent risks in using any consumer devices, urging users to consider the consequences of having “a spy in your pocket.” This comment underscores the growing anxiety surrounding personal data security, privacy, and surveillance brought about by modern technology. “What do you gain as an actual benefit, versus the very real and sadly too often demonstrated risk to life, liberty, and freedom from harm of yourself and those you know, care, or love around you,” he questioned.

This evolving cyber threat environment necessitates users to adopt a more cautious approach towards device usage and security practices, regardless of the operating system. As cybersecurity threats prevail, so must the vigilance and proactivity of users in safeguarding their digital identities. The exploration into Operation Triangulation serves as a crucial reminder of the delicate balance between technology use and the risks associated with it.
