Google’s Threat Analysis Group (TAG) discovered several exploit chains using Android, iOS, and Chrome zero-day and n-day vulnerabilities to install commercial spyware and malicious apps on targets’ devices.
The attackers targeted iOS and Android users with separate exploit chains as part of a first campaign spotted in November 2022.
They used text messages pushing bit.ly shortened links to redirect the victims to legitimate shipment websites from Italy, Malaysia, and Kazakhstan after first sending them to pages triggering exploits abusing a WebKit remote code execution zero-day (CVE-2022-42856) and a sandbox escape (CVE-2021-30900) bug.
Här har du Mackens Nyheter det senaste dygnet (2 augusti 2025)
Här har du Mackens Nyheter det senaste dygnet (2 augusti 2025) Trump tål inte verkligheten – sparkar statistikchef efter svaga jobbsiffror Donald Trump meddelade på fredagen att han avskedar Erika McEntarfer, chef för Bureau of Labor Statistics (BLS), den myndighet…
0 kommentarer