×

The Hated One's video: iPhones remotely compromised: iOS security is more broken than you think

@iPhones remotely compromised: iOS security is more broken than you think
For over two years, 14 critical zero-day vulnerabilities in Apple's iOS have been weaponized into 5 privilege-escalating zero-click exploit chains that have remotely and completely taken over hundreds of thousands of iPhones. Apple's response? Not a big deal. This was just "narrow" "targeted" campaign. Support independent content by donating Monero or Bitcoin Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz You can block scripts to prevent browser exploitation with: NoScript Security Suite: https://www.youtube.com/watch?v=AC4ALEKZRfg uBlock Origin tutorial: https://www.youtube.com/watch?v=2lisQQmWQkY The exploits have been in some way used from at least September 2016 and the attackers were supporting their exploit chains since at least iOS 10.0.1 until 12.1.4. Infected users would immediately have all of their data from their devices uploaded to remote servers and updates sent every 60 seconds. The data collected would include location, device model, keychain, name and serial number, phone number, contacts, messages, attachments, notes, list of installed apps, recordings, photos, files, call history, passwords and container directories of every app on the device. The implant had a hardcoded list of apps from which it always uploaded plain-text data to the attacker controlled servers. Among the selected apps were: Gmail, Facebook, Skype, Telegraph, WhatsApp and others. Sources [1] https://techcrunch.com/2019/08/29/google-iphone-secretly-hacked/ [2] https://googleprojectzero.blogspot.com/2019/08/a-very-deep-dive-into-ios-exploit.html [3] https://googleprojectzero.blogspot.com/2019/08/implant-teardown.html [4] https://www.vice.com/en_us/article/7x584y/exploit-sellers-say-there-are-more-iphone-hacks-on-the-market-than-theyve-ever-seen [5] https://arstechnica.com/information-technology/2019/08/armed-with-ios-0days-hackers-indiscriminately-infected-iphones-for-two-years/ [6] https://www.wired.com/story/ios-attack-watering-hole-project-zero/ [7] https://www.apple.com/newsroom/2019/09/a-message-about-ios-security/ [8] https://arstechnica.com/information-technology/2019/09/apple-takes-flak-for-disputing-ios-security-bombshell-dropped-by-google/ [9] https://www.forbes.com/sites/thomasbrewster/2019/09/01/iphone-hackers-caught-by-google-also-targeted-android-and-microsoft-windows-say-sources/ [10] https://techcrunch.com/2019/08/31/china-google-iphone-uyghur/ [11] https://techcrunch.com/2019/09/06/apple-doesnt-want-google-stoking-fear-about-serious-ios-security-exploits/ [12] https://www.reuters.com/article/us-china-cyber-uighurs/china-hacked-asian-telcos-to-spy-on-uighur-travelers-sources-idUSKCN1VQ1A5 [13] https://www.britannica.com/topic/Uighur [14] https://www.nytimes.com/2019/05/22/world/asia/china-surveillance-xinjiang.html [15] https://www.cyberscoop.com/apt3-nsa-tools-smb-check-point/ [16] https://googleprojectzero.blogspot.com/2019/08/in-wild-ios-exploit-chain-1.html [17] https://googleprojectzero.blogspot.com/2019/08/in-wild-ios-exploit-chain-3.html [18] https://googleprojectzero.blogspot.com/2019/08/in-wild-ios-exploit-chain-4.html [19] https://googleprojectzero.blogspot.com/2019/08/in-wild-ios-exploit-chain-5.html [20] https://www.wired.com/story/imessage-interactionless-hacks-google-project-zero/ [21] https://arstechnica.com/information-technology/2016/08/actively-exploited-ios-flaws-that-hijack-iphones-likely-spread-for-years/ [22] https://googleprojectzero.blogspot.com/2019/08/the-fully-remote-attack-surface-of.html [23] https://www.wired.com/story/imessage-interactionless-hacks-google-project-zero/ [24] https://www.wired.com/story/android-zero-day-more-than-ios-zerodium/ [25] https://www.cyberscoop.com/zerodium-android-zero-days-bounty/ [26] https://www.chicagotribune.com/nation-world/ct-apple-fbi-encryption-debate-20160412-story.html [27] https://www.cyberscoop.com/pwn2own-chinese-researchers-360-technologies-trend-micro/ [28] https://www.cyberscoop.com/ios-bug-bounty-apple-hack-china-zerodium/ [29] https://www.volexity.com/blog/2019/09/02/digital-crackdown-large-scale-surveillance-and-exploitation-of-uyghurs/ Credits Music by: CO.AG Music https://www.youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA Follow me: https://twitter.com/The_HatedOne_ https://www.bitchute.com/TheHatedOne/ https://www.reddit.com/r/thehatedone/ https://www.minds.com/The_HatedOne The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.

7.4K

878
The Hated One
Subscribers
431K
Total Post
254
Total Views
11.7M
Avg. Views
155.7K
View Profile
This video was published on 2019-09-17 02:40:03 GMT by @The-Hated-One on Youtube. The Hated One has total 431K subscribers on Youtube and has a total of 254 video.This video has received 7.4K Likes which are lower than the average likes that The Hated One gets . @The-Hated-One receives an average views of 155.7K per video on Youtube.This video has received 878 comments which are lower than the average comments that The Hated One gets . Overall the views for this video was lower than the average for the profile.

Other post by @The Hated One