Tech News

Hackers Look for Apple Weapons in Hong Kong on Massacre

Since at least In late August, high-profile hackers used the error macOS and iOS launching a malware program on Apple devices that targeted Hong Kong and democratic websites. The so-called watering eagles threw a large net, placing the back door on each iPhone or Mac accidentally to one of the affected pages.

Apple has installed various bugs that have allowed the campaign to take place. But a reports Thursday from Google’s Threat Analysis Group reveals how rogue the robbers were and how much they reached. It is another problem of problems that have not been mentioned before, either zero days, to be used in the wild they are rebels. Instead of fighting the protests by journalists and critics, however, a group thought to be backed by the government went ahead.

The recent attack is aimed at disrupting Hong Kong’s pages “media outlets and well-known democratic and political parties,” according to a TAG report. It is unknown at this time what he will do after leaving the post. But once installed on a compromised device, the distributed malware ran backwards and could download files or extract data, take pictures and keylogging, start recording, and execute other commands. It also made “fingerprints” for each victim’s device to identify them.

The attacks on iOS and macOS had different approaches, but they all built several threats together so that the attackers could target the targeted devices to launch a malware program. TAG was not able to analyze all of iOS, but it did detect a major Safari vulnerability that hackers used to trigger an attack. The macOS format affects WebKit vulnerability and kernel error. Everything was changed by Apple in 2021, and the use of macOS used in the attack was already released in the April and July Pangu Lab talks.

The researchers point out that the malware program that was transmitted directly through the irrigation hole was carefully designed and “appears to have been developed by a number of software experts.” It had a flexible shape, perhaps different weapons could be sent at different times in different attacks.

Chinese government-backed robbers are known to use zero-day threats to attack holes, including a campaign against the Uighurs. In 2019, Google’s Project Zero memorablely found another similar campaign which has been going on for more than two years, and was one of the first examples of modern iOS zero devices that are used to attack large numbers of people instead of fighting against real targets. This technique has been used by other actors. Shane Huntley, chief executive of Google TAG, said the group was not just thinking about what had happened and did not have enough evidence to prove it. He added that “the project and its purpose are in line with the state-sponsored actor.”

“I think it’s amazing that we’re still seeing these shows and the number of days available in the wild is increasing,” says Huntley. “Increasing our awareness of zero days is a good thing – it helps us to correct the shortcomings and protect users, and it gives us a more complete picture of the real violence that is taking place so that we can make informed decisions about how to prevent and deal with it.”

Apple devices have been known to be more secure and less vulnerable to malware, but this trend has changed as attackers have discovered and exploited zero-day threats in iPhones and Macs. As major water threats have shown many times now, attackers are not just pursuing realistic, valuable goals – they are ready to deal with the masses, no matter what they have.

Some of the Best WIRED Stories

Source link

Related Articles

Leave a Reply

Back to top button