No video

37C3 - Operation Triangulation: What You Get When Attack iPhones of Researchers

  Рет қаралды 68,882

media.ccc.de

media.ccc.de

Күн бұрын

media.ccc.de/v...
Imagine discovering a zero-click attack targeting Apple mobile devices of your colleagues and managing to capture all the stages of the attack. That’s exactly what happened to us! This led to the fixing of four zero-day vulnerabilities and discovering of a previously unknown and highly sophisticated spyware that had been around for years without anyone noticing. We call it Operation Triangulation. We've been teasing this story for almost six months, while thoroughly analyzing every stage of the attack. Now, for the first time, we're ready to tell you all about it. This is the story of the most sophisticated attack chain and spyware ever discovered by Kaspersky.
In this presentation, we will share:
* How we managed to discover and capture all stages of a zero-click attack on iOS, despite the attackers’ efforts to hide and protect it,
* a comprehensive analysis of the entire attack chain, which exploited five vulnerabilities, including four zero-days
* the capabilities of the malware that transforms your phone into the ultimate surveillance tool,
* and the links to previously known malware we were able to find.
oct0xor
kucher1n
bzvr_
events.ccc.de/...
#37c3 #Security

Пікірлер: 98
37C3 -  Apple's iPhone 15: Under the C
36:26
media.ccc.de
Рет қаралды 42 М.
37C3 -  All cops are broadcasting
1:03:55
media.ccc.de
Рет қаралды 153 М.
🩷🩵VS👿
00:38
ISSEI / いっせい
Рет қаралды 27 МЛН
37C3 -  Security Nightmares
1:07:50
media.ccc.de
Рет қаралды 109 М.
37C3 -  Breaking "DRM" in Polish trains
1:01:46
media.ccc.de
Рет қаралды 436 М.
How hackers spoof your email address
17:52
CTF Security
Рет қаралды 28 М.
Breaking Bitlocker - Bypassing the Windows Disk Encryption
9:11
stacksmashing
Рет қаралды 943 М.
37C3 -  Turning Chromebooks into regular laptops
38:55
media.ccc.de
Рет қаралды 69 М.
37C3 -  Unlocked! Recovering files taken hostage by ransomware
40:33
Running a Buffer Overflow Attack - Computerphile
17:30
Computerphile
Рет қаралды 2 МЛН
37C3 -  Finding Vulnerabilities in Internet-Connected Devices
47:22
media.ccc.de
Рет қаралды 25 М.
37C3 -  Toniebox Reverse Engineering
1:00:10
media.ccc.de
Рет қаралды 217 М.
3 Levels of WiFi Hacking
22:12
NetworkChuck
Рет қаралды 1,9 МЛН