Google reveals the details of the breakthrough of the iPhone in two years



[ad_1]

Google has revealed the details of the revolutionary history of the highly protected phones of the iPhone, which lasted two years.

Google researchers in the field of information security have found evidence of "unremitting efforts" over the past two years to penetrate the iPhone.

Hackers have used websites that can install malicious software that collects communications, images, and other data from phones.

Google researchers estimate that trapped sites record more than thousands of weekly visits.

Apple declined to comment, telling the BBC that he did not want to comment.

The attack was reported by a series of technical sites, details of which were written by Ian Bear, British expert on information security, member of the team of security analysts Google's "Project Zero", which searches for new security vulnerabilities that can be exploited for attacks on the company.

"There was no discernment of targets," wrote Bear. "Visit the hacked site so that a software operating server can attack your computer.

Bear and his team said they discovered that hackers were exploiting 12 different security vulnerabilities to infiltrate devices. This was mainly in the Safari browser used in Apple products.
Tireless effort

Once the malware enters an iPhone, it will be able to access a huge amount of data, including GPS, images and data. The software can send this information to an external device every 60 seconds, according to Ian Bear.

The software was also able to collect data from applications used by the hacked device, such as Instagram, WhatsApp and Telegram. Ian Peer's sample list included Google products such as Gmail and Hangouts.

The attackers managed to penetrate "all iOS versions from the tenth to the twelfth, which demonstrates the effort it is making to attack iPhone users in some communities over the next two years."

Apple has released a hotfix to fix the bug in February.

If you are an iPhone user, you need to make sure your phone uses the latest version of iOS to make sure you are protected.

On February 1 of this year, the Google team informed Apple of anomalies that had been released within six days.

Neither the expert Ian Peer predicted who was behind the attack nor the profits of the malware on the black market.

To print
E-mail




[ad_2]
Source link