![]() In the iOS case, the exploit chain targeted versions before iOS 15.1 using the following bugs: The links took the victims to pages that exploited flaws to infect their devices with GPS-tracking spyware and then redirected them to legitimate websites. The attack started with an SMS sent to the targets, which contained links shortened with the bit.ly service. ![]() The first campaign described in the TAG report, dubbed “Your missed parcel,” started in November 2022, targeting Android and iOS zero-day flaws. Google’s TAG team tracks over 30 vendors of commercial spyware, monitoring their capabilities and trying to stay ahead by pushing security fixes for its products while also informing other impacted tech vendors. Google says the attacks it discovered appear to be government-backed, deploying commercial spyware products sold to countries supposedly to help in law enforcement investigations. ![]() Zero-day flaws are software bugs that are unknown by the vendor or not fixed at the time of their exploitation by bad actors. Google’s Threat Analysis Group has identified spyware campaigns targeting Android and iOS users worldwide, exploiting zero-day vulnerabilities.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |