Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

Operation Triangulation: Could Apple be an NSA agent, Russia asks

Be careful when opening your iMessage attachments! According to Kaspersky, they can be an iPhone Trojan

byEray Eliaçık
June 2, 2023
in News, Cybersecurity
Home News
Share on FacebookShare on TwitterShare on LinkedInShare on WhatsAppShare on e-mail

While the attackers of Operation Triangulation remain a mystery for now, the speculations have already begun. Kaspersky researchers discovered a previously unknown mobile APT campaign targeting iOS devices. The campaign, which they are calling Operation Triangulation, uses zero-click exploits to infect devices via the iMessage platform. Once infected, the malware runs with root privileges, giving the attacker complete control over the device and user data.

Cold times: At the same time as Kaspersky’s investigation, Russia’s FSB (Federal Security Service) intelligence and security agency has made claims that Apple is working with the NSA. The Russian Federal Security Service claims that Apple deliberately provided the National Security Agency (NSA) with a backdoor, allowing malware to infect iPhones in Russia. A large number of hacked devices belonging to Russian government officials and workers from various embassies, they claim, is more proof of this. The FSB has made these assertions, but it has not presented any evidence.

While the attackers of Operation Triangulation remain a mystery for now, the speculations have already begun. Kaspersky researchers discovered a previously unknown mobile APT campaign targeting iOS devices

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

A previous Russian directive instructed the presidential staff and government workers to stop using iPhones and other products developed in the USA. The cyberattacks on Kaspersky’s Moscow headquarters and international staff have been verified. But, the business made clear that, without access to the government’s technical investigative data, it is unable to validate a direct relationship between its results and the FSB’s report. Nonetheless, the Russian CERT has issued a warning that is consistent with Kaspersky’s results and the FSB’s statement.

Meet the iPhone Trojan: How does Operation Triangulation work?

The first stage of Operation Triangulation involves sending the victim a malicious iMessage attachment. The attachment appears to be a legitimate file, such as a PDF or image. However, when the victim opens the attachment, the malware is installed on the device.

The malware then uses a zero-click exploit to gain root privileges on the device. This means that the attacker can do anything they want with the device, including stealing data, installing additional malware, or taking control of the device remotely.

“Due to the peculiarities of blocking iOS updates on infected devices, we have not yet found an effective way to remove spyware without losing user data. This can only be done by resetting infected iPhones to factory settings, installing the latest version of the operating system and the entire user environment from scratch. Otherwise, even if the spyware is deleted from the device memory following a reboot, Triangulation is still able to re-infect through vulnerabilities in an outdated version of iOS.”

-CEO Eugene Kaspersky explains on his blog

According to Kaspersky, the earliest evidence of infection dates back to 2019, yet the malware is still infecting iPhones today. On the bright side, the exploit has only been seen on iPhones running iOS 15.7 or earlier. Apple released iOS 15.7 in September 2022, and according to the Apple Developer Portal, more than 80% of all iPhones are running iOS 16 or later.

Operation Triangulation: Could Apple be an NSA agent, Russia asks
Image courtesy: Apple

In any case, Eugene Kaspersky insists that “the main focus of this hack was not Kaspersky Lab.” Why so many Kaspersky products were affected, how broad the spyware assault actually is, and whether or not the typical iPhone user is at risk are all questions that remain unanswered.

Meanwhile, there is just one more reason to update your iPhone’s operating system regularly.


See how Photoshop AI Generative Fill feature changes designers’ lives, a thread


Operation Triangulation: How to protect yourself from the iPhone trojan?

Several measures exist against mobile APT campaigns like Operation Triangulation, and here are some of them you can easily follow:

  • Do not open attachments from unknown senders: Even if the attachment appears to be from a legitimate source, it is best to err on the side of caution and not open it.
  • Keep your device’s operating system and apps up to date: Software updates often include security patches that can help protect your device from known vulnerabilities.
  • Use a security solution that can detect and block malicious apps: A good security solution can help protect your device from malware, even if you do open a malicious attachment.

While the attackers of Operation Triangulation remain a mystery for now, the speculations have already begun. Kaspersky researchers discovered a previously unknown mobile APT campaign targeting iOS devices

The Operation Triangulation malware poses a significant risk to iOS users, according to Kaspersky. The advanced techniques used in this campaign allow the attacker to infect devices and take full control of them. It’s crucial to secure your mobile devices against this and similar APT tactics.

Tags: AppleFeaturediOSOperation TriangulationRussiatrojan

Related Posts

Is 16GB of VRAM for just 9 AMD’s new gaming sweet spot?

Is 16GB of VRAM for just $349 AMD’s new gaming sweet spot?

May 21, 2025
Your next pair of Warby Parkers might secretly house a Google AI

Your next pair of Warby Parkers might secretly house a Google AI

May 21, 2025
Can Google’s tiny Gemma 3n AI really run smoothly on any device?

Can Google’s tiny Gemma 3n AI really run smoothly on any device?

May 21, 2025
Google I/O 2025 in a nutshell

Google I/O 2025 in a nutshell

May 21, 2025
How did Epic Games finally win its long App Store battle with Apple?

How did Epic Games finally win its long App Store battle with Apple?

May 21, 2025
Apple’s AI catch-up plan now seems to rely heavily on third-party devs

Apple’s AI catch-up plan now seems to rely heavily on third-party devs

May 21, 2025

LATEST NEWS

Is 16GB of VRAM for just $349 AMD’s new gaming sweet spot?

Your next pair of Warby Parkers might secretly house a Google AI

Can Google’s tiny Gemma 3n AI really run smoothly on any device?

Google I/O 2025 in a nutshell

How did Epic Games finally win its long App Store battle with Apple?

Apple’s AI catch-up plan now seems to rely heavily on third-party devs

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.