Get the latest tech news

Kaspersky finds hardware backdoor in 5 generations of Apple Silicon (2024)


Audio transcript There are some readers here who will understand the import of the statement above and not believe it, and there are others who are not in a position to understand it all. For both …

They had been following the propagation of Operation Triangulation, an APT (advanced persistent threat or complex malware that involves multiple stages of infection and attack using a variety of methods) which targets iOS devices through zero-click exploits distributed through iMessage. In the process of tracking the Triangulation malware ( more details here), Kaspersky found that the method for the initial attack vector sourced from an undocumented hardware feature that few, if anyone, outside of Apple and chip suppliers such as ARM Holdings knew of. Kaspersky initially became aware of issue due to finding Triangulation malware on their own staff devices Kaspersky’s researchers affirmatively and without question found a deliberately concealed, never documented, deliberately locked but unlockable with a secret hash, hardware backdoor which was designed into all Apple devices starting with the A12, A13, A14, A15 and A16 Triangulation attackers used the aforementioned 4 CVEs in an attack chain, along with the hardware backdoor capability under discussion here, to implement their zero-day 0-click malware

Get the Android app

Or read this on Hacker News

Read more on:

Photo of apple silicon

apple silicon

Photo of Kaspersky

Kaspersky

Photo of generations

generations

Related news:

News photo

Apple missed screenshot-snooping malware in code that made it into the App Store, Kaspersky claims

News photo

Kaspersky researchers find screenshot-reading malware on the App Store and Google Play

News photo

Show HN: Lume – OS lightweight CLI for MacOS and Linux VMs on Apple Silicon