Articles tagged "iOS"

Found 13 articles

Kaspersky has reported that SparkCat malware has resurfaced on app stores, specifically targeting cryptocurrency users in Asia. This malware has been found in applications available for both iOS and Android devices. Users downloading these apps may unknowingly expose their sensitive information, such as cryptocurrency wallet details, to attackers. This resurgence is particularly concerning given the increasing popularity of cryptocurrency among users, making them prime targets for cybercriminals. As the malware spreads, it underlines the need for users to be vigilant about the apps they download and the permissions they grant.

Impact: iOS and Android applications targeting cryptocurrency users
Remediation: Users should verify the legitimacy of apps before downloading, avoid apps from untrusted sources, and regularly update their devices with the latest security patches.
Read Original

WhatsApp has informed around 200 users that they were deceived into installing a counterfeit version of its iOS app, which contained spyware. Most of the affected individuals are based in Italy. The attackers reportedly employed social engineering tactics to trick users into downloading the malicious app. This incident raises concerns about the security of mobile applications and highlights the need for users to be vigilant about the sources from which they download software. With spyware potentially compromising personal information, it is crucial for users to ensure they are using legitimate applications from trusted sources.

Impact: WhatsApp iOS app
Remediation: Users should verify app downloads through official app stores and be cautious of unsolicited links or downloads.
Read Original

A Russian-linked hacking group known as TA446 is actively targeting iPhone users through a new phishing campaign that employs the DarkSword iOS exploit kit. These attacks involve sending malicious emails designed to compromise iOS devices, putting users' personal information at risk. The group, also referred to as SEABORGIUM and ColdRiver, has been noted for its sophisticated tactics in the past. This wave of phishing emphasizes the increasing dangers that smartphone users face, especially as attackers refine their methods to bypass security measures. As these campaigns evolve, it’s crucial for iPhone users to remain vigilant about suspicious emails and links.

Impact: iPhone users, iOS devices
Remediation: Users should avoid clicking on links or downloading attachments from unknown or suspicious emails. Keeping iOS devices updated to the latest version may help mitigate vulnerabilities.
Read Original

Recent findings from Kaspersky reveal that the Coruna iOS exploit kit is using an updated version of the kernel exploit code from the 2023 Operation Triangulation campaign. This exploit targets two specific vulnerabilities in Apple’s iOS, raising concerns about the potential for mass attacks against users. Initially, there wasn't enough evidence to connect Coruna to the earlier campaign, but researchers have now established a clear link. This means that devices running affected versions of iOS could be at risk from attackers leveraging these exploits. Users and organizations need to be vigilant and ensure their devices are updated to protect against these threats.

Impact: Apple iOS devices affected by the vulnerabilities exploited in the Coruna kit.
Remediation: Users should update their iOS devices to the latest version to mitigate the risks associated with these vulnerabilities.
Read Original

The Cybersecurity and Infrastructure Security Agency (CISA) has directed U.S. government agencies to address three vulnerabilities in iOS that have been exploited in attacks related to cryptocurrency theft and cyberespionage, specifically using the DarkSword exploit kit. These vulnerabilities pose a significant risk, as they can allow attackers to gain unauthorized access to sensitive information on affected devices. The order to patch these flaws is crucial for protecting personal and governmental data from potential breaches. Agencies must act promptly to implement the necessary updates to safeguard against these threats. Failure to patch could leave systems vulnerable to exploitation by cybercriminals targeting financial assets and confidential information.

Impact: iOS devices, U.S. government agencies
Remediation: Agencies should apply the latest iOS updates to mitigate the vulnerabilities.
Read Original

A new exploit kit called 'Darksword' is being used to target iPhones, particularly affecting users of cryptocurrency wallet applications. This exploit allows attackers to steal various personal information from compromised devices. The existence of Darksword raises significant concerns, especially for those who handle sensitive financial data on their mobile devices. As users increasingly rely on their phones for managing cryptocurrencies, the risk of falling victim to such attacks is growing. It’s crucial for iPhone users to stay vigilant and ensure their devices are updated to protect against these vulnerabilities.

Impact: iPhones, cryptocurrency wallet applications
Remediation: Users should update their iOS devices to the latest version and consider using security features such as two-factor authentication for their cryptocurrency wallets.
Read Original

The Cybersecurity and Infrastructure Security Agency (CISA) has alerted U.S. federal agencies to address three critical security flaws in iOS that have been exploited in cyberespionage and cryptocurrency theft. These vulnerabilities are being targeted through the Coruna exploit kit, which has been linked to recent attacks. Federal agencies are urged to implement patches promptly to protect sensitive information and financial assets. The exploitation of these flaws poses serious risks, potentially allowing attackers to gain unauthorized access to devices and data. Swift action is essential to mitigate these threats and secure federal systems.

Impact: iOS devices, specifically those vulnerable to the identified flaws.
Remediation: Federal agencies are ordered to patch the identified iOS vulnerabilities as soon as possible.
Read Original

The Coruna exploit kit has been identified as a significant threat targeting older iPhones, specifically those running iOS versions from 13.0 to 17.2.1. Cybercriminals are using this toolkit to steal financial data from users, which raises concerns about the safety of personal and financial information on these devices. Researchers have noted that this multi-stage campaign is particularly aimed at exploiting vulnerabilities in outdated operating systems, making it crucial for users to stay updated. With many individuals still using older iPhone models, the risks associated with this exploit are substantial. Users are urged to upgrade their devices to the latest iOS version to protect against these attacks.

Impact: iPhones running iOS versions 13.0 to 17.2.1
Remediation: Users should update their iPhones to the latest iOS version to mitigate risks.
Read Original
Actively Exploited

The latest Security Affairs Malware newsletter covers several significant malware threats that have emerged recently. Notably, a group identified as Stan Ghouls is targeting users in Russia and Uzbekistan using the NetSupport Remote Access Trojan (RAT), which allows attackers to control infected systems remotely. Another concerning development is the discovery of ZeroDayRAT, a new spyware designed to infiltrate both Android and iOS devices. Additionally, researchers have uncovered a Linux botnet named SSHStalker, which utilizes old-school IRC methods to compromise new victims. These activities demonstrate the evolving tactics of cybercriminals and emphasize the need for users and organizations to remain vigilant against these persistent threats.

Impact: NetSupport RAT, ZeroDayRAT (Android and iOS), SSHStalker Linux Botnet
Remediation: Users should implement security updates, monitor network activity for unusual behavior, and utilize endpoint protection solutions to mitigate these threats.
Read Original
Actively Exploited

Apple has addressed a serious zero-day vulnerability, identified as CVE-2026-20700, which was used in targeted attacks last year. This flaw, a memory corruption issue in the dyld component of Apple's operating systems, could allow attackers to execute arbitrary code on affected devices. Specifically, the vulnerability impacts versions of iOS prior to iOS 26 and was reportedly exploited in sophisticated attacks against select individuals. Users of these older versions should update their devices to protect against potential exploitation.

Impact: Affected products include Apple's iOS versions prior to iOS 26, particularly those using the dyld component.
Remediation: Users are advised to update their devices to the latest version of iOS to mitigate the vulnerabilities associated with CVE-2026-20700.
Read Original

Researchers have identified a new spyware kit called ZeroDayRAT, which is being distributed via Telegram. This toolkit is said to allow attackers to fully compromise both iOS and Android devices, functioning at a level typically associated with resources available to nation-states. The implications of this spyware are significant, as it can potentially give hackers complete access to personal data and device controls. Users of mobile devices, especially those who may be targeted for sensitive information, should be particularly cautious. The emergence of such advanced tools raises serious concerns about mobile security and privacy.

Impact: iOS and Android devices
Remediation: Users should ensure their devices are updated with the latest security patches and be cautious about downloading unknown apps or clicking on suspicious links.
Read Original

Apple has issued updates for macOS and iOS to address two zero-day vulnerabilities in WebKit that were found to be exploited in a highly sophisticated attack. These vulnerabilities could allow attackers to execute malicious code on affected devices, potentially compromising user data and privacy. The updates are crucial for users of Apple's platforms, as they help protect against active threats that exploit these flaws. Users are encouraged to install the latest updates to ensure their devices are secure. This incident also raises concerns about the interconnectedness of browser vulnerabilities, as these flaws are linked to a Chrome exploit, indicating that security issues can cross platform boundaries.

Impact: macOS, iOS, WebKit
Remediation: Install the latest macOS and iOS updates that patch the vulnerabilities.
Read Original

CISA has identified that various cyber threat actors are using commercial spyware to target users of mobile messaging applications, employing tactics such as phishing, zero-click exploits, and impersonation. The focus is primarily on high-value individuals including government and military officials, indicating a serious threat to sensitive communications.

Impact: Mobile messaging applications including Signal and WhatsApp.
Remediation: Users are encouraged to review the updated Mobile Communications Best Practice Guidance and Mitigating Cyber Threats with Limited Resources: Guidance for Civil Society for steps to protect mobile communications and messaging apps.
Read Original