Apple has addressed three zero-day vulnerabilities exploited in attacks deploying Triangulation spyware on iPhones through iMessage zero-click exploits. The company acknowledged the issue, stating that it may have been actively exploited in versions of iOS released before iOS 15.7. The vulnerabilities, identified as CVE-2023-32434 and CVE-2023-32435, were reported by Kaspersky security researchers Georgy Kucherin, Leonid Bezvershenko, and Boris Larin.
Kaspersky’s report also sheds light on an iOS spyware component called TriangleDB, deployed after attackers gain root privileges through a kernel vulnerability. The implant operates in memory, making it challenging to detect as it disappears upon device reboot, requiring attackers to resend a malicious iMessage to reinfect the device. In response to the identified vulnerabilities, Apple has taken action to address the threats posed by the Triangulation spyware.
The company has acknowledged the potential exploitation of these vulnerabilities in iOS versions preceding 15.7. The two specific flaws, CVE-2023-32434 and CVE-2023-32435, were discovered and reported by Kaspersky researchers, highlighting the collaborative efforts between security experts and technology companies to mitigate emerging threats. Kaspersky’s detailed report on the spyware component, TriangleDB, reveals its deployment post-root access exploitation and its ephemeral nature in memory, emphasizing the importance of vigilance and proactive measures in the ever-evolving landscape of cybersecurity. Kaspersky’s findings include insights into the tactics of the attackers behind “Operation Triangulation.”
The spyware, TriangleDB, is deployed in a manner that erases traces upon device reboot, necessitating a reinfection process via iMessage with a malicious attachment. Additionally, the report notes that the implant self-uninstalls after 30 days unless extended by the attackers. This revelation underscores the sophistication of the spyware and the strategic approach taken by threat actors to maintain persistent access to compromised devices while evading detection. The incident highlights the ongoing cat-and-mouse game between cybersecurity researchers and malicious actors, emphasizing the need for continuous innovation in securing digital ecosystems.