{"id":5375,"date":"2019-11-01T07:10:20","date_gmt":"2019-11-01T07:10:20","guid":{"rendered":"https:\/\/www.conferencecall.co.uk\/blog\/?p=5375"},"modified":"2019-10-31T18:29:41","modified_gmt":"2019-10-31T18:29:41","slug":"google-spots-ios-hack","status":"publish","type":"post","link":"https:\/\/www.conferencecall.co.uk\/blog\/google-spots-ios-hack\/","title":{"rendered":"Google spots iOS hack"},"content":{"rendered":"<p>Thousands of Apple devices have been under attack from hackers since 2016, and it was only uncovered when Google&#8217;s Project Zero Threat Analysis Group (TAG) discovered a small collection of hacked websites that we being used to hack devices running on operating systems iOS 10 to iOS 12.<\/p>\n<p>Was your device compromised? Here&#8217;s more on the hack&#8230;<\/p>\n<h2>Safety in numbers<\/h2>\n<p>Apple&#8217;s smartphones have a reputation for being pretty secure from hackers. What you might not realise is this is down to numbers more than anything &#8211; because there are fewer iOS users than Android users, attacks on Apple devices are less profitable to hackers.<\/p>\n<p>This is why hacks on Apple devices are usually usually focused on specific, more profitable groups, such as politicians or large companies. The strange thing about the Apple hack is that it appears to be completely indiscriminate, which isn&#8217;t the most profitable route for cyber criminals to go down.<\/p>\n<h2>How were the Apple devices compromised?<\/h2>\n<p>The exploit chains were active since iOS 10, which is available since September 2016.\u00a0The attacks continued with the iOS 11 and iOS 12 updates, with the hack coming to an end when Apple released iOS 12.1.4 on February 7.\u00a0The exploit chains, so-called implants, came over infected websites on the devices.\u00a0Thousands of site visitors were infected each week over a period of at least two years, with the Safari app acting as the door.\u00a0In fact, a simple reboot removes the implant, but users tend not to reboot frequently.<\/p>\n<p><iframe src=\"https:\/\/www.youtube.com\/embed\/8H9HSDbMRoQ\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<figure id=\"attachment_1542\" class=\"wp-caption aligncenter\" aria-describedby=\"caption-attachment-1542\"><figcaption id=\"caption-attachment-1542\" class=\"wp-caption-text\"><\/figcaption><\/figure>\n<h2><strong>What information was accessed?<\/strong><\/h2>\n<p>Once the implant was in the system, it hit the databases of messenger apps like\u00a0WhatsApp\u00a0, iMessage or Telegram.\u00a0Even e-mail clients like\u00a0Outlook\u00a0were affected.\u00a0The exploit chain accessed messages and photos from actually encrypted chats.\u00a0Furthermore, passwords as well as W-LAN accesses from the Apple Keychain were read out and the position of the device was tracked by GPS.\u00a0The identity of the perpetrators has not yet been announced &#8211; nor their motives.\u00a0It is speculated that certain, larger target groups were in the crosshairs.\u00a0After these were probably also selected the web pages, which were initially infected.<\/p>\n<p><a href=\"https:\/\/www.conferencecall.co.uk\/conference-call\"><img decoding=\"async\" class=\"alignnone wp-image-1777 size-full\" src=\"https:\/\/www.conferencecall.co.uk\/blog\/wp-content\/uploads\/2015\/05\/conference-call-banner.jpg\" alt=\"\" width=\"650\" height=\"118\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Thousands of Apple devices have been under attack from hackers since 2016, and it was only uncovered when Google&#8217;s Project Zero Threat Analysis Group (TAG) discovered a small collection of&#8230;<\/p>\n<div class=\"more-link-wrapper\"><a class=\"more-link\" href=\"https:\/\/www.conferencecall.co.uk\/blog\/google-spots-ios-hack\/\">Read More<span class=\"screen-reader-text\">Google spots iOS hack<\/span><\/a><\/div>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[13,17],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Google spots iOS hack - ConferenceCall.co.uk blog<\/title>\n<meta name=\"description\" content=\"Thousands of Apple devices running on operating systems iOS 10 to iOS 12 have been under attack from hackers since 2016. Was your device compromised?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.conferencecall.co.uk\/blog\/google-spots-ios-hack\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Google spots iOS hack - ConferenceCall.co.uk blog\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.conferencecall.co.uk\/blog\/google-spots-ios-hack\/\" \/>\n<meta property=\"og:site_name\" content=\"ConferenceCall.co.uk blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pages\/Conference-Call-UK\/178511498997826\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-01T07:10:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-10-31T18:29:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.conferencecall.co.uk\/blog\/wp-content\/uploads\/2015\/08\/data-hack.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"531\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Les Roberts\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@LesRobertsMedia\" \/>\n<meta name=\"twitter:site\" content=\"@ConfCallUK\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Les Roberts\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.conferencecall.co.uk\/blog\/google-spots-ios-hack\/\",\"url\":\"https:\/\/www.conferencecall.co.uk\/blog\/google-spots-ios-hack\/\",\"name\":\"Google spots iOS hack - ConferenceCall.co.uk blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.conferencecall.co.uk\/blog\/#website\"},\"datePublished\":\"2019-11-01T07:10:20+00:00\",\"dateModified\":\"2019-10-31T18:29:41+00:00\",\"author\":{\"@id\":\"https:\/\/www.conferencecall.co.uk\/blog\/#\/schema\/person\/fd51b09e17d75360ba18197c2c1c535b\"},\"description\":\"Thousands of Apple devices running on operating systems iOS 10 to iOS 12 have been under attack from hackers since 2016. Was your device compromised?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.conferencecall.co.uk\/blog\/google-spots-ios-hack\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.conferencecall.co.uk\/blog\/google-spots-ios-hack\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.conferencecall.co.uk\/blog\/google-spots-ios-hack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.conferencecall.co.uk\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Google spots iOS hack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.conferencecall.co.uk\/blog\/#website\",\"url\":\"https:\/\/www.conferencecall.co.uk\/blog\/\",\"name\":\"ConferenceCall.co.uk blog\",\"description\":\"Conference calling made easy\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.conferencecall.co.uk\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.conferencecall.co.uk\/blog\/#\/schema\/person\/fd51b09e17d75360ba18197c2c1c535b\",\"name\":\"Les Roberts\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.conferencecall.co.uk\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d887807fb3eaf5e8705c4d4f1328df3e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d887807fb3eaf5e8705c4d4f1328df3e?s=96&d=mm&r=g\",\"caption\":\"Les Roberts\"},\"sameAs\":[\"https:\/\/twitter.com\/LesRobertsMedia\"],\"url\":\"https:\/\/www.conferencecall.co.uk\/blog\/author\/les\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Google spots iOS hack - ConferenceCall.co.uk blog","description":"Thousands of Apple devices running on operating systems iOS 10 to iOS 12 have been under attack from hackers since 2016. Was your device compromised?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.conferencecall.co.uk\/blog\/google-spots-ios-hack\/","og_locale":"en_GB","og_type":"article","og_title":"Google spots iOS hack - ConferenceCall.co.uk blog","og_url":"https:\/\/www.conferencecall.co.uk\/blog\/google-spots-ios-hack\/","og_site_name":"ConferenceCall.co.uk blog","article_publisher":"https:\/\/www.facebook.com\/pages\/Conference-Call-UK\/178511498997826","article_published_time":"2019-11-01T07:10:20+00:00","article_modified_time":"2019-10-31T18:29:41+00:00","og_image":[{"width":800,"height":531,"url":"https:\/\/www.conferencecall.co.uk\/blog\/wp-content\/uploads\/2015\/08\/data-hack.jpg","type":"image\/jpeg"}],"author":"Les Roberts","twitter_card":"summary_large_image","twitter_creator":"@LesRobertsMedia","twitter_site":"@ConfCallUK","twitter_misc":{"Written by":"Les Roberts","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.conferencecall.co.uk\/blog\/google-spots-ios-hack\/","url":"https:\/\/www.conferencecall.co.uk\/blog\/google-spots-ios-hack\/","name":"Google spots iOS hack - ConferenceCall.co.uk blog","isPartOf":{"@id":"https:\/\/www.conferencecall.co.uk\/blog\/#website"},"datePublished":"2019-11-01T07:10:20+00:00","dateModified":"2019-10-31T18:29:41+00:00","author":{"@id":"https:\/\/www.conferencecall.co.uk\/blog\/#\/schema\/person\/fd51b09e17d75360ba18197c2c1c535b"},"description":"Thousands of Apple devices running on operating systems iOS 10 to iOS 12 have been under attack from hackers since 2016. Was your device compromised?","breadcrumb":{"@id":"https:\/\/www.conferencecall.co.uk\/blog\/google-spots-ios-hack\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.conferencecall.co.uk\/blog\/google-spots-ios-hack\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.conferencecall.co.uk\/blog\/google-spots-ios-hack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.conferencecall.co.uk\/blog\/"},{"@type":"ListItem","position":2,"name":"Google spots iOS hack"}]},{"@type":"WebSite","@id":"https:\/\/www.conferencecall.co.uk\/blog\/#website","url":"https:\/\/www.conferencecall.co.uk\/blog\/","name":"ConferenceCall.co.uk blog","description":"Conference calling made easy","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.conferencecall.co.uk\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.conferencecall.co.uk\/blog\/#\/schema\/person\/fd51b09e17d75360ba18197c2c1c535b","name":"Les Roberts","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.conferencecall.co.uk\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d887807fb3eaf5e8705c4d4f1328df3e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d887807fb3eaf5e8705c4d4f1328df3e?s=96&d=mm&r=g","caption":"Les Roberts"},"sameAs":["https:\/\/twitter.com\/LesRobertsMedia"],"url":"https:\/\/www.conferencecall.co.uk\/blog\/author\/les\/"}]}},"_links":{"self":[{"href":"https:\/\/www.conferencecall.co.uk\/blog\/wp-json\/wp\/v2\/posts\/5375"}],"collection":[{"href":"https:\/\/www.conferencecall.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.conferencecall.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.conferencecall.co.uk\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.conferencecall.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=5375"}],"version-history":[{"count":3,"href":"https:\/\/www.conferencecall.co.uk\/blog\/wp-json\/wp\/v2\/posts\/5375\/revisions"}],"predecessor-version":[{"id":5381,"href":"https:\/\/www.conferencecall.co.uk\/blog\/wp-json\/wp\/v2\/posts\/5375\/revisions\/5381"}],"wp:attachment":[{"href":"https:\/\/www.conferencecall.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=5375"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.conferencecall.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=5375"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.conferencecall.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=5375"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}