Close Menu
The Daily PostingThe Daily Posting
  • Home
  • Android
  • Business
  • IPhone
    • Lifestyle
  • Politics
  • Europe
  • Science
    • Top Post
  • USA
  • World
Facebook X (Twitter) Instagram
Trending
  • Jennifer Lopez and Ben Affleck reveal summer plans after Europe trip
  • T20 World Cup: Quiet contributions from Akshar Patel, Kuldeep Yadav and Ravindra Jadeja justify Rohit Sharma’s spin vision | Cricket News
  • The impact of a sedentary lifestyle on health
  • Bartok: The World of Lilette
  • Economists say the sharp rise in the U.S. budget deficit will put a strain on Americans’ incomes
  • Our Times: Williams memorial unveiled on July 4th | Lifestyle
  • Heatwaves in Europe are becoming more dangerous: what it means for travelers
  • Christian Science speaker to visit Chatauqua Institute Sunday | News, Sports, Jobs
Facebook X (Twitter) Instagram
The Daily PostingThe Daily Posting
  • Home
  • Android
  • Business
  • IPhone
    • Lifestyle
  • Politics
  • Europe
  • Science
    • Top Post
  • USA
  • World
The Daily PostingThe Daily Posting
IPhone

Government hackers exploit iPhone flaw to monitor victims

thedailyposting.comBy thedailyposting.comFebruary 7, 2024No Comments

[ad_1]

Rotten to the core

Tame Apple Press claims Apple’s iPhone is highly secure, but government hackers don’t seem to have gotten the memo.

Last year, Google revealed that government hackers had exploited three secret holes in Apple’s iPhone systems to target victims with spyware created by a European startup.

Google’s Threat Analysis Group, the company’s team that investigates state-sponsored hacking, has identified several attacks carried out using hacking tools created by multiple spyware and exploit sellers, including Barcelona-based startup Variston. released a report on the attack on the government.

According to Google, in one of the attacks, government hackers used three iPhone “zero-days,” a hole that Apple was unaware of at the time of use.

In this case, the hacking tool was created by Variston, a spying and hacking technology startup whose malware has already been checked twice by Google in 2022 and 2023.

Google announced that it was discovered in March 2023 that an unidentified Variston buyer was using this zero-day to target iPhones in Indonesia.

The hacker sent an SMS text message containing a troubling link that Jobs opened because he trusted his mob. The link infected the victim’s phone with spyware and directed the victim to a news article in the Indonesian newspaper Pikiran Rakyat.

Google has not disclosed who the government buyer of Balliston is in this case. No one knows who Variston sold the spyware to. According to Google, Variston “works with several other groups to create and sell spyware.”

Google said one of those groups is Protected AE, which is based in the United Arab Emirates. Local company documents say the company was founded in 2016 as “Protect Electronic Systems” and is based in Abu Dhabi. Protect’s official website describes the company as a “leading cybersecurity and forensics company.”

Google said that Protect will “mix the spyware it creates on Heliconia’s systems and networks into a complete package and sell it to local dealers or directly to government buyers,” adding that Google is already in talks in 2022. We are talking about Variston’s software Heliconia.

Variston was founded in Barcelona in 2018 by Ralph Wegener and Ramanan Jayaraman and shortly after acquired Italian zero-day research company Truel IT.



[ad_2]

Source link

thedailyposting.com
  • Website

Related Posts

Shocking moment a thief climbs over a counter in an east London store, struggles with a female shop assistant and steals an iPhone worth £700

June 28, 2024

AAA games for iPhone and iPad are not very popular with users

June 28, 2024

Apple’s price cuts boost iPhone sales in China

June 28, 2024
Leave A Reply Cancel Reply

ads
© 2025 thedailyposting. Designed by thedailyposting.
  • Home
  • About us
  • Contact us
  • DMCA
  • Privacy Policy
  • Terms of Service
  • Advertise with Us
  • 1711155001.38
  • xtw183871351
  • 1711198661.96
  • xtw18387e4df
  • 1711246166.83
  • xtw1838741a9
  • 1711297158.04
  • xtw183870dc6
  • 1711365188.39
  • xtw183879911
  • 1711458621.62
  • xtw183874e29
  • 1711522190.64
  • xtw18387be76
  • 1711635077.58
  • xtw183874e27
  • 1711714028.74
  • xtw1838754ad
  • 1711793634.63
  • xtw183873b1e
  • 1711873287.71
  • xtw18387a946
  • 1711952126.28
  • xtw183873d99
  • 1712132776.67
  • xtw183875fe9
  • 1712201530.51
  • xtw1838743c5
  • 1712261945.28
  • xtw1838783be
  • 1712334324.07
  • xtw183873bb0
  • 1712401644.34
  • xtw183875eec
  • 1712468158.74
  • xtw18387760f
  • 1712534919.1
  • xtw183876b5c
  • 1712590059.33
  • xtw18387aa85
  • 1712647858.45
  • xtw18387da62
  • 1712898798.94
  • xtw1838737c0
  • 1712953686.67
  • xtw1838795b7
  • 1713008581.31
  • xtw18387ae6a
  • 1713063246.27
  • xtw183879b3c
  • 1713116334.31
  • xtw183872b3a
  • 1713169981.74
  • xtw18387bf0d
  • 1713224008.61
  • xtw183873807
  • 1713277771.7
  • xtw183872845
  • 1713329335.4
  • xtw183874890
  • 1716105960.56
  • xtw183870dd9
  • 1716140543.34
  • xtw18387691b

Type above and press Enter to search. Press Esc to cancel.