Is it possible to hack iPhone with a single message?

cyber security researchers, to iPhones revealed the new attack. Hackers using four vulnerabilities in the device, iMessage It manages to infiltrate the device with the messages they send through it. This shows that iPhone users are in danger.

iPhone hacking: How does the new iMessage attack work?

In the latest study conducted by Kaspersky researchers, “Operation TriangulationThe zero-day attack of the group called ” was revealed. According to the researchers’ report, hackers carry out a multi-stage attack chain.

The Triangulation group is exploiting a bug in Apple’s font rendering system via iMessage. Using this bug, it sends messages containing malicious code. These messages initiate an attack on the victim’s device.

Xiaomi will give the colors of its new car to the Xiaomi 14 series!Xiaomi will give the colors of its new car to the Xiaomi 14 series!

Xiaomi will give the colors of its new car to the Xiaomi 14 series!

Xiaomi will give the colors of the SU7 electric car it introduced today to Xiaomi 14, Xiaomi 14 Pro and Xiaomi Watch S3.

After infiltrating the device, various security protections on the iPhone are bypassed to elevate the privilege of the code and gain system-level access. Group to manipulate memory and bypass page protection layers added with iOS 16 on the bionic chip takes advantage of the vulnerability.

Researchers were unable to find any documentation about hardware logs used in the attack. Even Apple engineers involved in the research stated that they were unfamiliar with the zero-day vulnerabilities used by the attack. However, Apple did not neglect to release updates against four vulnerabilities.

Although this attack is quite dangerous, iOS 16.6 or older It should be noted that it affects the systems. So, if you have updated your device to iOS 17, you will not be affected by attackers. This shows that most iPhones are safe.

So what do you think about this issue? You can share your opinions with us in the Comments section below.

source site-28