For a long time, there has been a popular belief among many that hacking the iPhone is impossible, but it seems that this is no longer true, at the same time that the date was announced Detection of iPhone 11Google's Project Zero group revealed that a group of hackers are exploiting some security vulnerabilities of the iPhone and targeting thousands of victims.

The Project Zero team, a team of experts and security analysts affiliated with Google, announced their mission to find gaps and weaknesses in various systems and inform companies of these vulnerabilities in order to protect themselves from them.

According to Google security experts, many serious security holes have been discovered in the components of the operating system of the iPhone, and some of these vulnerabilities are present in the Safari browser, while the rest of the vulnerabilities are in the components and programs of the operating system.

IPhone hack

In a series of seven posts, Ian Bear, a Google security analyst, said that the hackers used some malicious websites and exploited the security holes on the iPhone device to spread many malware on those devices with the ability to easily access users' personal and sensitive information and data.


How was the iPhone hacked?

The vulnerabilities and loopholes that have been discovered can pose a serious risk to iPhone users when they visit certain sites, these sites are used by hackers in order to carry out the attack and hack the iPhone device and contact it remotely and then access many important information, including contacts and GPS data And the images, in addition to the ability to read the conversations of chat applications such as WhatsApp, Gmail, and even iMessage, despite their encryption.

Hackers were able to create five hacking chains consisting of 14 separate vulnerabilities and vulnerabilities, seven of those vulnerabilities exist in the default web browser for iOS known as Safari, while there are five vulnerabilities in the system kernel and two weaknesses in the sandbox known as the sandbox responsible for restricting access Applications for user data.

IPhone hack

And each of the five chains is designed to target different versions of the iPhone's operating system, and devices running iOS 10 and later have been vulnerable to hacking for a while, as Google experts revealed that these serious flaws lasted more than two years with the iPhone.

Finally, Google did not name the malicious websites that acted as an infection and targeting mechanism for the iPhone or share other details about the attackers and victims.


How to protect yourself from this vulnerability?

The good news is that this vulnerability is not newly discovered, so Google experts found it at the beginning of this year and informed Apple that addressed the problem by issuing the update iOS 12.1.4 (about 7 months ago) and closed these vulnerabilities. That is, if your device is running iOS 12.1.4 or later, you are safe. Here comes the importance of your device being on the latest version.

It is noteworthy that Apple refused to comment on this matter, but that this incident is the largest known hacking and hacking of the iPhone device. It is reported that Apple announced a reward program of up to $ 1 million for those who can help it find security holes in its systems.

Did this vulnerability affect your view of the safety, privacy and immunity of the iOS system against penetration and that it is not the same as an Android system? Let us know what you think in the comments.

Source:

wired

Related articles