Virtualization Technology News and Information
Article
RSS
Kaspersky reveals new details on spyware used in Operation Triangulation

Following its recent report on the Operation Triangulation campaign targeting iOS devices, Kaspersky experts are sharing new details about the spyware implant used during the attacks. Dubbed TriangleDB, the implant grants attackers covert surveillance capabilities. It operates solely in memory, ensuring that all evidence of the implant is erased upon device reboot.

Kaspersky recently reported on a new mobile Advanced Persistent Threat (APT) campaign that specifically targets iOS devices via iMessage. Following the six-month investigation, the company's researchers published an in-depth analysis of the exploitation chain and uncovered details of the spyware implant operation. The implant, dubbed TriangleDB, is deployed by exploiting a kernel vulnerability to acquire root privileges on the targeted iOS device. Once deployed, it operates solely in the device's memory, so traces of the infection disappear upon the device reboot. Consequently, if the victim restarts their device, the attacker needs to reinfect it by sending another iMessage with a malicious attachment, initiating the entire exploitation process once again. If no reboot occurs, the implant will automatically uninstall itself after 30 days, unless the attackers extend this period. Operating as complex spyware, TriangleDB performs a wide range of data collection and monitoring capabilities.

In total, the implant includes 24 commands with diverse functionalities. These commands serve various purposes, such as interacting with the device's filesystem (including file creation, modification, exfiltration, and removal), managing processes (listing and termination), extracting keychain items to gather victim credentials, and monitoring the victim's geolocation, among others.

While analyzing TriangleDB, Kaspersky experts discovered that the CRConfig class contains an unused method called populateWithFieldsMacOSOnly. While not utilized in the iOS implant, its presence suggests the possibility of targeting macOS devices with a similar implant.

"As we delved into the attack, we discovered a sophisticated iOS implant that displayed numerous intriguing oddities," said Georgy Kucherin, security expert at Kaspersky Global Research and Analysis Team (GReAT). "We continue analyzing the campaign and will keep everyone updated with further insights into this sophisticated attack. We call upon the cybersecurity community to unite, share knowledge and collaborate to get a clearer picture around the threats out there."

To learn more about TriangleDB spyware, visit Securelist.com.

Published Wednesday, June 21, 2023 1:13 PM by David Marshall
Filed under:
Comments
There are no comments for this post.
To post a comment, you must be a registered user. Registration is free and easy! Sign up now!
Calendar
<June 2023>
SuMoTuWeThFrSa
28293031123
45678910
11121314151617
18192021222324
2526272829301
2345678