• iPhone spyware is everyone's problem now

    From Lissajous@megahurts9911@kilos.net to comp.os.linux.advocacy,comp.sys.mac.advocacy,alt.computer.workshop on Mon Mar 23 13:09:08 2026
    From Newsgroup: comp.os.linux.advocacy

    "iPhone spyware is everyone's problem now"

    <https://archive.is/h9OYm#selection-379.0-379.40>

    "Cybercriminal groups are now using spyware tools once utilized mainly by spies and law enforcement to hack into iPhones, new research shows.
    Why it matters: Anyone with an iPhone can now be the target of invasive malware that siphons off personal text messages, photos, notes and
    calendar data.


    Driving the news: In the last month, researchers at Google, iVerify and Lookout uncovered two campaigns exploiting iPhone vulnerabilities.
    Earlier this month, Google researchers said they identified a
    sophisticated iPhone hacking toolkit, called Coruna, originally built for
    an unnamed government customer that later ended up in the hands of a
    Chinese cybercriminal group. TechCrunch later reported that defense
    contractor L3Harris created the spyware for the U.S. government.
    Hackers deployed Coruna on fake Chinese-language crypto and financial platforms, infecting vulnerable iPhones that visited the sites — no
    clicks or downloads required.



    On the same server, researchers said Wednesday they found another iPhone hacking kit, dubbed DarkSword, that can instantly infect iPhones visiting
    a specific set of websites, including Ukrainian news and government
    sites, as part of a so-called "watering hole attack."


    Zoom in: Researchers have linked DarkSword to a Russian-based hacking
    group, though it's unclear whether the group is tied to a government
    agency or a proxy cybercriminal gang.


    Once on a device, DarkSword exfiltrates nearly everything, including
    messages sent from iMessage, WhatsApp and Telegram, location data, phone contacts, call histories, WiFi configurations, browser history and
    cookies, according to iVerify.


    Although DarkSword itself was targeting visitors to Ukrainian websites, Lookout researchers say its developers left the underlying JavaScript
    code on the server unobscured, meaning even low-level cybercriminals
    could copy and reuse the tool for a broader range of targets.


    Yes, but: Apple spokesperson Sarah O'Rourke said that the company has
    already patched the underlying iOS vulnerabilities that the spyware
    targets through new versions of iOS in recent years.


    Apple also rolled out an emergency software update last week for older
    devices that aren't able to download newer version of the operating
    system.


    Apple's Safari is now blocking the malicious URL domains identified in Google's research, she added.

    Threat level: Replicating or acquiring these tools, built on rare and
    highly valuable iPhone vulnerabilities, was once limited to well-funded government customers.
    State actors have used such tools to monitor activists, journalists and foreign politicians.


    Now, cybercriminals can get their hands on them, lowering the barrier to launching these kinds of attacks and widening the range of potential
    targets.


    "With the huge influx of investment in commercial spyware vendors, an ecosystem has been created around mobile exploitation that makes these
    tools, frankly, abundant," Rocky Cole, iVerify's co-founder and COO, told Axios.

    The big picture: Apple has long marketed iPhones as highly secure
    devices, attracting users who prioritize privacy or need to protect
    sensitive communications.


    But the recent research suggests the devices might not be as secure as
    once thought, Cole said. "Every single iPhone user has to worry about
    this now."


    O'Rourke, the Apple spokesperson, said that Apple devices are designed
    with "multiple layers of security in order to protect against a wide
    range of potential threats," and that "Apple's security teams around the
    world work tirelessly to protect users' devices and data."


    The intrigue: Justin Albrecht, Lookout's global director of mobile threat intelligence, told Axios the actors behind DarkSword likely used a large language model to help develop parts of their hacking kit, based on how
    some files are named.


    Inside the code used for data exfiltration, one file was simply labeled "DarkSword file receiver," he said.

    "No one who's doing any kind of (offensive security) would leave that up
    there with that name," Albrecht said. "I'm not convinced that this group
    is even very technically capable."

    The bottom line: Lockdown Mode, Apple's security mode for preventing
    spyware infections, would have prevented just parts of the DarkSword
    exploit, according to iVerify, and all of Coruna, which is designed to
    halt if Lockdown Mode is enabled.


    While there's no foolproof defense against these watering hole attacks, Albrecht recommends keeping devices updated, enabling Lockdown Mode and
    using third-party mobile security tools.
    "Those are great steps you can take, but unfortunately, there's very
    little that you can do as a user even to detect it," he said"
    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From CrudeSausage@crude@sausa.ge to comp.os.linux.advocacy,comp.sys.mac.advocacy,alt.computer.workshop on Mon Mar 23 10:09:24 2026
    From Newsgroup: comp.os.linux.advocacy

    On 2026-03-23 9:09 a.m., Lissajous wrote:
    "iPhone spyware is everyone's problem now"

    <https://archive.is/h9OYm#selection-379.0-379.40>

    "Cybercriminal groups are now using spyware tools once utilized mainly by spies and law enforcement to hack into iPhones, new research shows.
    Why it matters: Anyone with an iPhone can now be the target of invasive malware that siphons off personal text messages, photos, notes and
    calendar data.

    This is a fact. That is why it is very important to keep your phone
    updated and not to open text messages from people you don't know.
    --
    CrudeSausage
    Islam is poison, leftism is retardation.
    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From Tom Elam@thomas.e.elam@gmail.com to comp.os.linux.advocacy,comp.sys.mac.advocacy,alt.computer.workshop on Mon Mar 23 18:48:35 2026
    From Newsgroup: comp.os.linux.advocacy

    On 3/23/26 9:09 AM, Lissajous wrote:
    "iPhone spyware is everyone's problem now"

    "With the huge influx of investment in commercial spyware vendors, an ecosystem has been created around mobile exploitation that makes these
    tools, frankly, abundant," Rocky Cole, iVerify's co-founder and COO, told Axios.

    The big picture: Apple has long marketed iPhones as highly secure
    devices, attracting users who prioritize privacy or need to protect
    sensitive communications.


    But the recent research suggests the devices might not be as secure as
    once thought, Cole said. "Every single iPhone user has to worry about
    this now."



    Not just iOS.

    https://www.forbes.com/sites/daveywinder/2026/03/16/critical-flaw-875-million-android-phones-at-risk-of-60-second-hack/
    If you were to lose your Android smartphone, whether by accident or
    theft, you might take comfort in the fact that it is locked down so that
    it cannot be accessed, at least. Unless, that is, you are one of the
    estimated 875 million people using a phone that includes any of a number
    of MediaTek chips. Security researchers uncovered a vulnerability that
    allowed them to recover the security PIN number and the root keys that
    are there to protect encrypted storage, all before the device was fully booted. All of which took less than 60 seconds. While the Android
    smartphone was switched off.
    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From CrudeSausage@crude@sausa.ge to comp.os.linux.advocacy,comp.sys.mac.advocacy,alt.computer.workshop on Mon Mar 23 19:36:27 2026
    From Newsgroup: comp.os.linux.advocacy

    On 2026-03-23 6:48 p.m., Tom Elam wrote:
    On 3/23/26 9:09 AM, Lissajous wrote:
    "iPhone spyware is everyone's problem now"

    "With the huge influx of investment in commercial spyware vendors, an
    ecosystem has been created around mobile exploitation that makes these
    tools, frankly, abundant," Rocky Cole, iVerify's co-founder and COO, told
    Axios.

    The big picture: Apple has long marketed iPhones as highly secure
    devices, attracting users who prioritize privacy or need to protect
    sensitive communications.


    But the recent research suggests the devices might not be as secure as
    once thought, Cole said. "Every single iPhone user has to worry about
    this now."



    Not just iOS.

    https://www.forbes.com/sites/daveywinder/2026/03/16/critical-flaw-875- million-android-phones-at-risk-of-60-second-hack/
    If you were to lose your Android smartphone, whether by accident or
    theft, you might take comfort in the fact that it is locked down so that
    it cannot be accessed, at least. Unless, that is, you are one of the estimated 875 million people using a phone that includes any of a number
    of MediaTek chips. Security researchers uncovered a vulnerability that allowed them to recover the security PIN number and the root keys that
    are there to protect encrypted storage, all before the device was fully booted. All of which took less than 60 seconds. While the Android
    smartphone was switched off.

    Just about everything is easy to access by professionals who work in
    security anyway. I imagine that even the hardware encryption I rely on
    can easily be broken. In the end, people need to understand that the
    security is meant to keep pretty thieves out of our machines, not law enforcement.
    --
    CrudeSausage
    Islam is poison, leftism is retardation.
    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From Nick Charles@none@none.none to alt.computer.workshop,comp.os.linux.advocacy,comp.sys.mac.advocacy on Tue Mar 24 03:28:58 2026
    From Newsgroup: comp.os.linux.advocacy

    Lissajous <megahurts9911@kilos.net> wrote:
    "iPhone spyware is everyone's problem now"

    <https://archive.is/h9OYm#selection-379.0-379.40>

    “Apple spokesperson Sarah O'Rourke said that the company has already
    patched the underlying iOS vulnerabilities that the spyware targets through
    new versions of iOS in recent years.”

    “recent years”??? You link to an “Archive”? This is ancient “news”.

    WTF was your point again?



    --- Synchronet 3.21f-Linux NewsLink 1.2