iPhone Hack: Google Uncovers Evidence Of Massive Hacking Attempt

Google Uncovers Evidence Of iPhone Hacking Attempt

IPHONE – Google researchers announced that they discovered a two-year-long security vulnerability in iPhone’s software.

The American multinational technology company Google is a search engine that specializes in Internet-related services. Nowadays, people rely mostly on this site using their phones or computers to look for information than books.

Aside from searching for information, their services include cloud computing, browser, Web application, internet analytics, and operating system development. The company headquarters is in Mountain View, California.

Google
Photo Source: Engadget

Based on a report from CNN, researchers said Google uncovered the evidence of attempted hack to large numbers of iPhone users marketed by Apple Inc. over a period of at least 2 years. The cybersecurity experts of Google “discovered a small collection of hacked websites” that utilize iPhones’ software earlier this year.

On Thursday, a researcher with Google’s Project Zero, named Ian Beer revealed the news in a blog post. However, he did not disclose the name of the website.

“Simply visiting the hacked site was enough for the exploit server to attack your device, and if it was successful, install a monitoring implant… We estimate that these sites receive thousands of visitors per week,” said Beer.

Iphone
Photo Source: Techspot

According to the report, Project Zero researchers said the hackers can access the iPhone users’ photos, locations, and contacts as well as apps like Telegram, Gmail, iMessage, WhatsApp, and Google Hangouts.

They found “a total of fourteen vulnerabilities,” and half of them were linked to the web browser of the iPhone. They notified Apple Inc. about the hacking issue.

Iphone-1
Photo Source: Vice

Based on the report, iPhone’s “iOS10 through to the latest version of iOS 12” was vulnerable. Beer also warned about the other potential attacks.

“For this one campaign that we’ve seen, there are almost certainly others that are yet to be seen… All that users can do is be conscious of the fact that mass exploitation still exists and behave accordingly; treating their mobile devices as both integral to their modern lives, yet also as devices which when compromised, can upload their every action into a database to potentially be used against them,” he said.

What can you say about this article? Leave your comment and reactions below.

Leave a Comment