Hackers used compromised websites to infect iOS and other operating systems – 9to5Mac2 min read

https://9to5mac.com/2021/03/18/hackers-used-compromised-websites-to-infect-ios-and-other-operating-systems/

Regardless of all the efforts companies make to enhance the security of their gadgets, theres constantly somebody working to find new vulnerabilities. This time, a group of innovative hackers handled to contaminate devices running iOS, Android, and Windows through compromised sites.

In October 2020, we discovered that the star from the February 2020 campaign came back with the next iteration of their project: a couple dozen websites redirecting to an exploit server. As soon as our analysis started, we discovered links to a second make use of server on the same website. After preliminary fingerprinting (seeming based upon the origin of the IP address and the user-agent), an iframe was injected into the site indicating one of the 2 exploit servers.

As reported by ArsTechnica, Attackers have been using harmful websites to get to delicate parts of the operating system due to the found security breaches. Members of Project Zero, which is a team at Google that tries to find security exploits on different platforms, said that these hackers found 11 zero-day vulnerabilities.
The attacks utilizing such breaches started in February 2020 and went on till October 2020. Harmful code was injected into the webpage by means of an iframe that indicated made use of servers. Scientists point out that one of the servers was concentrated on attacking iOS and Windows users, while the other responded to Android gadgets.

For those not familiar with the term, a zero-day make use of is basically a recently found vulnerability that the repair is still unidentified to the designers. The report discusses that the hackers had advanced knowledge of what they were doing as they were able to bypass the security systems of “well-fortified OSes and apps that were totally patched.”
In another example of how the hackers have experience with zero-day exploits, they were able to rapidly reopen the breach after Google updated the Chrome engine with a repair. To put it simply, even if users were running the most recent variation of the app or operating system, they would still be susceptible to being contaminated when accessing a compromised site.
While keeping the software application on your devices as much as date is still important to avoid security concerns, users should be careful of opening websites or apps that they do not extremely trust. More information about this exploit can be discovered on the Project Zero blog site.
FTC: We use earnings earning vehicle affiliate links. More.
Have a look at 9to5Mac on YouTube for more Apple news:

After initial fingerprinting (appearing to be based on the origin of the IP address and the user-agent), an iframe was injected into the website pointing to one of the two exploit servers.

Destructive code was injected into the webpage through an iframe that pointed to exploited servers. Scientists point out that one of the servers was focused on attacking iOS and Windows users, while the other reacted to Android devices.

Leave a Reply

Your email address will not be published. Required fields are marked *