• Business
  • Markets
  • Politics
  • Crypto
  • Finance
  • Intelligence
    • Policy Intelligence
    • Security Intelligence
    • Economic Intelligence
    • Fashion Intelligence
  • Energy
  • Technology
  • Taxes
  • Creator Economy
  • Wealth Management
  • LBNN Blueprints
  • Business
  • Markets
  • Politics
  • Crypto
  • Finance
  • Intelligence
    • Policy Intelligence
    • Security Intelligence
    • Economic Intelligence
    • Fashion Intelligence
  • Energy
  • Technology
  • Taxes
  • Creator Economy
  • Wealth Management
  • LBNN Blueprints

Vulnerable iPhone Hardware Feature in Operation Triangulation Uncovered – IT News Africa

Simon Osuji by Simon Osuji
January 12, 2024
in Technology
0
Vulnerable iPhone Hardware Feature in Operation Triangulation Uncovered – IT News Africa
0
SHARES
2
VIEWS
Share on FacebookShare on Twitter

Related posts

VCDF, SEEPCO launch free eye care programme in Delta’s Ndokwa East LGA – EnviroNews

VCDF, SEEPCO launch free eye care programme in Delta’s Ndokwa East LGA – EnviroNews

February 24, 2026
AABNet, partners launch guide on the conservation of African livestock genetic resources – EnviroNews

AABNet, partners launch guide on the conservation of African livestock genetic resources – EnviroNews

February 24, 2026

A previously unknown hardware feature in Apple iPhones, pivotal in the Operation Triangulation campaign was recently exposed. The feature was exposed by Kaspersky’s Global Research and Analysis Team (GReAT), at the 37th Chaos Communication Congress in Hamburg.

Kaspersky’s research team disclosed that this is one of the most sophisticated attack chain they have witnessed to date.

The vulnerability of the Apple System was discovered on a chip, or SoC, that has played a critical role in the recent iPhone attacks known as “Operation Triangulation”, allowing attackers to bypass the hardware-based memory protection on iPhones running iOS versions up to iOS 16.6.

“Operation Triangulation” is an Advanced Persistent Threat (APT) campaign targeting iOS devices. This sophisticated campaign employs zero-click and exploits distributed via iMessage, which then allows attackers to gain complete control over the targeted device and access user data.

Apple responded to the attacks, by releasing security updates to address four zero-day vulnerabilities: CVE-2023-32434, CVE-2023-32435, CVE-2023-38606, and CVE-2023-41990.

These vulnerabilities impact a broad spectrum of Apple products, including iPhones, iPods, iPads, macOS devices, Apple TV, and Apple Watch.

The discovered vulnerability is a hardware feature, possibly based on the principle of of “security through obscurity”, and may have been intended for testing or debugging.

Following the initial 0-Click iMessage attack and subsequent privilege escalation, it was found that the attackers leveraged this hardware feature to bypass hardware-based security protections and manipulate the contents of protected memory regions. This was found to be a crucial step to obtaining full control over the device. Apple addressed the issue, identified as CVE-2023-38606.

Because the feature was not publicly documented, it presented a significant challenge in its detection and analysis using conventional security methods.

Boris Larin, Principal Security Researcher at Kaspersky’s GReAT, explains, “This is no ordinary vulnerability. Due to the closed nature of the iOS ecosystem, the discovery process was both challenging and time-consuming, requiring a comprehensive understanding of both hardware and software architectures.

“What this discovery teaches us once again is that even advanced hardware-based protections can be rendered ineffective in the face of sophisticated attacker, particularly when there are hardware features allowing to bypass these protections.”

 

Source link

Previous Post

CJ Koome says JSC is Ready to deal with Corrupt Judicial Officers, Judges

Next Post

Open-Source AI Is Uniquely Dangerous

Next Post
Open-Source AI Is Uniquely Dangerous

Open-Source AI Is Uniquely Dangerous

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

RECOMMENDED NEWS

Eye tracker measuring a new addition to the Ergotech arsenal

Eye tracker measuring a new addition to the Ergotech arsenal

1 year ago
The Best iPhone 16 Cases and Accessories (2024), Tested and Reviewed

The Best iPhone 16 Cases and Accessories (2024), Tested and Reviewed

1 year ago
Industry Eyes Emission Offsets For Cleaner Air In Poorer Communities

Industry Eyes Emission Offsets For Cleaner Air In Poorer Communities

4 months ago

First Distribution Agreement Executed with Sonic Healthcare

3 years ago

POPULAR NEWS

  • Ghana to build three oil refineries, five petrochemical plants in energy sector overhaul

    Ghana to build three oil refineries, five petrochemical plants in energy sector overhaul

    0 shares
    Share 0 Tweet 0
  • The world’s top 10 most valuable car brands in 2025

    0 shares
    Share 0 Tweet 0
  • Top 10 African countries with the highest GDP per capita in 2025

    0 shares
    Share 0 Tweet 0
  • Global ranking of Top 5 smartphone brands in Q3, 2024

    0 shares
    Share 0 Tweet 0
  • When Will SHIB Reach $1? Here’s What ChatGPT Says

    0 shares
    Share 0 Tweet 0

Get strategic intelligence you won’t find anywhere else. Subscribe to the Limitless Beliefs Newsletter for monthly insights on overlooked business opportunities across Africa.

Subscription Form

© 2026 LBNN – All rights reserved.

Privacy Policy | About Us | Contact

Tiktok Youtube Telegram Instagram Linkedin X-twitter
No Result
View All Result
  • Home
  • Business
  • Politics
  • Markets
  • Crypto
  • Economics
    • Manufacturing
    • Real Estate
    • Infrastructure
  • Finance
  • Energy
  • Creator Economy
  • Wealth Management
  • Taxes
  • Telecoms
  • Military & Defense
  • Careers
  • Technology
  • Artificial Intelligence
  • Investigative journalism
  • Art & Culture
  • LBNN Blueprints
  • Quizzes
    • Enneagram quiz
  • Fashion Intelligence

© 2023 LBNN - All rights reserved.