Get the latest tech news
Kaspersky finds hardware backdoor in 5 generations of Apple Silicon (2024)
Audio transcript There are some readers here who will understand the import of the statement above and not believe it, and there are others who are not in a position to understand it all. For both …
They had been following the propagation of Operation Triangulation, an APT (advanced persistent threat or complex malware that involves multiple stages of infection and attack using a variety of methods) which targets iOS devices through zero-click exploits distributed through iMessage. In the process of tracking the Triangulation malware ( more details here), Kaspersky found that the method for the initial attack vector sourced from an undocumented hardware feature that few, if anyone, outside of Apple and chip suppliers such as ARM Holdings knew of. Kaspersky initially became aware of issue due to finding Triangulation malware on their own staff devices Kaspersky’s researchers affirmatively and without question found a deliberately concealed, never documented, deliberately locked but unlockable with a secret hash, hardware backdoor which was designed into all Apple devices starting with the A12, A13, A14, A15 and A16 Triangulation attackers used the aforementioned 4 CVEs in an attack chain, along with the hardware backdoor capability under discussion here, to implement their zero-day 0-click malware
Or read this on Hacker News