Following its recent report on the
Operation Triangulation campaign targeting iOS devices, Kaspersky experts are
sharing new
details about the spyware implant used during the attacks. Dubbed
TriangleDB, the implant grants attackers covert surveillance capabilities. It
operates solely in memory, ensuring that all evidence of the implant is erased
upon device reboot.
Kaspersky recently reported on a new mobile Advanced
Persistent Threat (APT) campaign that specifically targets iOS devices via
iMessage. Following the six-month investigation, the company's researchers published
an in-depth analysis of the exploitation chain and uncovered details of the
spyware implant operation. The implant, dubbed TriangleDB, is deployed by exploiting
a kernel vulnerability to acquire root privileges on the targeted iOS device.
Once deployed, it operates solely in the device's memory, so traces of the
infection disappear upon the device reboot. Consequently, if the victim
restarts their device, the attacker needs to reinfect it by sending another
iMessage with a malicious attachment, initiating the entire exploitation
process once again. If no reboot occurs, the implant will automatically
uninstall itself after 30 days, unless the attackers extend this period.
Operating as complex spyware, TriangleDB performs a wide range of data
collection and monitoring capabilities.
In total,
the implant includes 24 commands with diverse functionalities. These commands
serve various purposes, such as interacting with the device's filesystem
(including file creation, modification, exfiltration, and removal), managing
processes (listing and termination), extracting keychain items to gather victim
credentials, and monitoring the victim's geolocation, among others.
While analyzing TriangleDB, Kaspersky experts discovered
that the CRConfig class contains an unused method called
populateWithFieldsMacOSOnly. While not utilized in the iOS implant, its
presence suggests the possibility of targeting macOS devices with a similar
implant.
"As we delved into the attack, we discovered a sophisticated
iOS implant that displayed numerous intriguing oddities," said Georgy Kucherin,
security expert at Kaspersky Global Research and Analysis Team (GReAT). "We continue analyzing the campaign
and will keep everyone updated with further insights into this sophisticated
attack. We call upon the cybersecurity community to unite, share
knowledge and collaborate to get a clearer picture around the threats out
there."
To learn more about TriangleDB spyware, visit Securelist.com.