Spyware Targeting iOS Devices via MITM Attacks and Zero Days

Spyware Targeting iOS Devices via MITM Attacks and Zero Days

New spyware named "Predator" infecting iOS via MITM attacks and zero day vulnerabilities

Apple had announced to their customers the new patches for three zero-days, those were:

Important to note that the mentioned vulnerabilities affected devices with running iOS versions before 16.7.

According to The University of Toronto’s Citizen Lab group and Google’s Threat Analysis Group, the vulnerabilities were chained and targeted towards Ahmed Altantawy (leading opposition politican in Egypt).


Risk Factor

Government:

  • Large and medium government entities: HIGH
  • Small government: MEDIUM

Businesses:

  • Large and medium business entities: HIGH
  • Small business entities: MEDIUM
  • Home Users: LOW


What is there to learn?

Like I always say, education is the most important thing you have to keep chasing consistently.

My advice is to not be arrogant thinking "I don't need to update my software, everything is working well!" and just update your devices to the latest version.

Now, not all of us are high-ranked politicians, but there are only benefits to updating software and securing yourself from vulnerabilities that I've mentioned.


Follow Eman ?ati? for more news!

要查看或添加评论,请登录

Eman ?ati?的更多文章

  • Exclusive Community Invitation

    Exclusive Community Invitation

    I'm officially opening the first Patreon community for bug bounty hunters. I worked hard to create valuable posts to…

  • The XSS Handbook

    The XSS Handbook

    I've just released my first handbook that will guide you to learning how to hunt for XSS vulnerabilities. This…

    3 条评论
  • How to pick a bug bounty program?

    How to pick a bug bounty program?

    Introduction When starting your bug bounty journey, most people's struggles are picking the "perfect" bug bounty…

    3 条评论
  • How to use AI tools securely? (without doxxing your company)

    How to use AI tools securely? (without doxxing your company)

    As software development teams increasingly adopt artificial intelligence (AI) tools, they gain access to powerful…

    1 条评论
  • How To Use Amass? (like a pro)

    How To Use Amass? (like a pro)

    In this newsletter edition I will shine a light on a tool I that many know about but very few know how to use…

    1 条评论
  • Shodan: Hidden Bug Bounty Tool

    Shodan: Hidden Bug Bounty Tool

    What is Shodan? Shodan is a search engine for Internet-connected devices and a powerful tool for bug hunters. It…

  • How to hack using Google?

    How to hack using Google?

    What is Google Dorking? Technique of utilizing Google search keywords and functions to obtain sensitive information and…

  • How to hack using Google?

    How to hack using Google?

    What is Google Dorking? Technique of utilizing Google search keywords and functions to obtain sensitive information and…

  • How to hack using Google?

    How to hack using Google?

    What is Google Dorking? Technique of utilizing Google search keywords and functions to obtain sensitive information and…

  • How to enumerate JS files?

    How to enumerate JS files?

    Why? A lot of sensitive information is exposed through JS files. There is always a chance a developer made a mistake.

    1 条评论

社区洞察