Affiliate Disclosure
If you buy through our links, we may get a commission. Read our ethics policy.

'Operation Triangulation' exposes advanced iMessage attack on security firm

Researchers uncover a sophisticated iPhone attack

Security experts have disclosed an astonishing four-year campaign of iPhone hacking targeting the Russian security company Kaspersky, which has been labeled "the most sophisticated exploit ever."

Operation Triangulation's attack involved a complex series of exploits, including a zero-click iMessage attack, targeting iOS up to version 16.2. The attack began with a malicious iMessage attachment exploiting an undocumented TrueType font instruction, leading to remote code execution.

The exploit chain incorporated multiple techniques such as return/jump oriented programming, JavaScript obfuscation, and manipulation of JavaScriptCore and kernel memory, according to Kaspersky researcher Boris Larin.

Exploiting hidden hardware registers

A key part of the attack was using special hardware controls (MMIO registers) to get around Apple's Page Protection security layer. It was done through specific weaknesses, tracked as CVE-2023-41990, CVE-2023-32434, and CVE-2023-38606 in the database of security flaws.

By exploiting these flaws, the attackers could access all the memory of the iPhone and gain complete control to carry out further actions like sending recordings from the microphone, pictures, location information, and other confidential data to their servers.

One of these weaknesses, CVE-2023-38606, was especially tricky, letting attackers bypass extra security in newer iPhones. That was done by sending data to certain parts of the iPhone's memory using some hidden parts of Apple's chips, which were probably meant for checking and fixing problems.

Diagram of the Triangulation exploit chain Diagram of the Triangulation exploit chain

The researchers found these hidden parts connected to the iPhone's graphics processor. When they tried to access them, it caused the graphics processor to crash, which showed they were a part of the attack.

One particular control, numbered 0x206040000, was vital because it was used at the start and end of the attack. That suggests it was used to turn on or off a unique hardware feature or to manage alerts during the attack.

Apple fixed the security problem by updating the device's internal map (known as the device tree) to recognize and control access to specific memory areas, specifically the ranges 0x206000000-0x206050000 and 0x206110000-0x206400000, which were being misused in the attack.

The device's system (XNU) uses this map to decide if it should allow access to certain parts of its memory. Each area in the map is clearly labeled to show what kind of memory it is and what it's used for.

Is it possible to stay safe from Triangulation?

Apple has already patched the combination of exploits used here.

While it's impossible to stay safe from a zero-day attack, iPhone users can still take several steps to mitigate the damage. However, in this case, it was a targeted munition, directly aimed at Kaspersky employees.

Regularly updating the iOS to the latest version is crucial, as it includes fixes for known security vulnerabilities. Users should exercise caution with messages, especially from unknown sources, avoiding clicking on suspicious links or downloading attachments.

Employing strong, unique passwords and enabling two-factor authentication for the Apple ID adds another layer of security. Next, regular backups of iPhone data can mitigate damage in case of an attack.

Finally, Apple added a feature called "Lockdown Mode" to iPhone, Mac, and iPad in iOS 16, macOS Ventura, and iPadOS 16. It's a security feature designed primarily for high-profile individuals who might be targets of sophisticated cyberattacks.

The feature isn't intended for everyday use due to its highly restrictive nature, significantly limiting device functionality.



9 Comments

🕯️
Fidonet127 5 Years · 598 comments

In before Tim Cook and Apple circle jerk army arrive telling us Android is much worse, and this is nothing to worry about.

It is solved by updated OSs and was a targeted attack, affecting very few people. Lockdown mode also helps. The amount of solicitation and research to pull this off is amazing, and wasn't done by your average hacker. The average person wasn't affected.

❄️
damn_its_hot 15 Years · 1213 comments

Important news and advice - glad AAPL is on top of this! Follow the advice @ end of article and/or see me. 

This is a good time to look @ status for Nord VPN - they tickled me about renewal a few days ago - we paid 4 a 2 yr. Subscription & it sure doesn’t seem like 2 years yet (not even close).

☕️
gatorguy 13 Years · 24636 comments

The more interesting part of this is the undisclosed hardware that allows bypassing the secure element.

So that remains the big question:
How did the attacker become aware of that piece of hidden hardware, something only a very select number of Apple employees or perhaps the chip manufacturer should have been known existed? I can understand the Russians pointing fingers at Apple as being in cahoots, but there's no evidence at the moment Apple was aware the hidden hardware had been exploited, much less advised any governmental agency about how it might be used for spy games.

🎁
damn_its_hot 15 Years · 1213 comments

SORRY FOLX - the previous post was written as if my wife was the target. I copied and (thought) I sent to her but as is often the case AI had diff ideas and posted directly to Formum Comments - OOPS!

Oh well dear hearts Happy New Year ( and if drinking or otherwise self medicating ) pass the keys to someone SOBER please !!!

🍪
appleinsideruser 5 Years · 665 comments

gatorguy said:
The more interesting part of this is the undisclosed hardware that allows bypassing the secure element.

So that remains the big question:
How did the attacker become aware of that piece of hidden hardware, something only a very select number of Apple employees or perhaps the chip manufacturer should have been known existed? I can understand the Russians pointing fingers at Apple as being in cahoots, but there's no evidence at the moment Apple was aware the hidden hardware had been exploited, much less advised any governmental agency about how it might be used for spy games.

Indeed. Yet security by obfuscation is not the solution. Don’t add backdoors.