
{"id":25974,"date":"2021-07-14T20:45:00","date_gmt":"2021-07-15T00:45:00","guid":{"rendered":"https:\/\/dviouscontent.com\/index.php\/2021\/07\/14\/ios-zero-day-let-solarwinds-hackers-compromise-fully-updated-iphones\/"},"modified":"2021-07-14T21:15:16","modified_gmt":"2021-07-15T01:15:16","slug":"ios-zero-day-let-solarwinds-hackers-compromise-fully-updated-iphones","status":"publish","type":"post","link":"https:\/\/dviouscontent.com\/index.php\/2021\/07\/14\/ios-zero-day-let-solarwinds-hackers-compromise-fully-updated-iphones\/","title":{"rendered":"iOS Zero-Day Let SolarWinds Hackers Compromise Fully Updated iPhones"},"content":{"rendered":"<p> [ad_1]<br \/>\n<\/p>\n<div id=\"fhbody-149053611\">\n<div id=\"text-149053611\" class=\"p\">\n<p>\t\t\t\tThe Russian state hackers who orchestrated the SolarWinds provide chain assault final yr exploited an iOS zero-day as a part of a separate malicious e mail marketing campaign geared toward stealing Net authentication credentials from Western European governments, based on Google and Microsoft. Ars Technica stories: <i> In a submit Google revealed on Wednesday, researchers Maddie Stone and Clement Lecigne stated a &#8220;possible Russian government-backed actor&#8221; exploited the then-unknown vulnerability by sending messages to authorities officers over LinkedIn. Assaults focusing on CVE-2021-1879, because the zero-day is tracked, redirected customers to domains that put in malicious payloads on totally up to date iPhones. The assaults coincided with a marketing campaign by the identical hackers who delivered malware to Home windows customers, the researchers stated.<br \/>\n<\/i><\/p>\n<p>The marketing campaign carefully tracks to 1 Microsoft disclosed in Could. In that occasion, Microsoft stated that Nobelium &#8212; the title the corporate makes use of to establish the hackers behind the SolarWinds provide chain assault &#8212; first managed to compromise an account belonging to USAID, a US authorities company that administers civilian overseas help and growth help. With management of the company&#8217;s account for on-line advertising and marketing firm Fixed Contact, the hackers might ship emails that appeared to make use of addresses identified to belong to the US company. In an e mail, Shane Huntley, the top of Google&#8217;s Menace Evaluation Group, confirmed the connection between the assaults involving USAID and the iOS zero-day, which resided within the WebKit browser engine. <\/p>\n<\/div><\/div>\n<p>[ad_2]<br \/>\n<br \/><a href=\"http:\/\/rss.slashdot.org\/~r\/Slashdot\/slashdot\/~3\/L3DwijiVmHg\/ios-zero-day-let-solarwinds-hackers-compromise-fully-updated-iphones\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[ad_1] The Russian state hackers who orchestrated the SolarWinds provide chain assault final yr exploited an iOS zero-day as a part of a separate malicious e mail marketing campaign geared toward stealing Net authentication credentials from Western European governments, based on Google and Microsoft. Ars Technica stories: In a submit Google revealed on Wednesday, researchers [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":25976,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[11629,6951,7540,305,11630,11628,356,11627],"class_list":["post-25974","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-new-released","tag-compromise","tag-fully","tag-hackers","tag-ios","tag-iphones","tag-solarwinds","tag-updated","tag-zeroday"],"_links":{"self":[{"href":"https:\/\/dviouscontent.com\/index.php\/wp-json\/wp\/v2\/posts\/25974","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dviouscontent.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dviouscontent.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dviouscontent.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dviouscontent.com\/index.php\/wp-json\/wp\/v2\/comments?post=25974"}],"version-history":[{"count":1,"href":"https:\/\/dviouscontent.com\/index.php\/wp-json\/wp\/v2\/posts\/25974\/revisions"}],"predecessor-version":[{"id":25975,"href":"https:\/\/dviouscontent.com\/index.php\/wp-json\/wp\/v2\/posts\/25974\/revisions\/25975"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dviouscontent.com\/index.php\/wp-json\/wp\/v2\/media\/25976"}],"wp:attachment":[{"href":"https:\/\/dviouscontent.com\/index.php\/wp-json\/wp\/v2\/media?parent=25974"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dviouscontent.com\/index.php\/wp-json\/wp\/v2\/categories?post=25974"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dviouscontent.com\/index.php\/wp-json\/wp\/v2\/tags?post=25974"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}