28 C
Monday, August 10, 2020
Tel: 8850717892

iPhone Users at Risk of Hacking Through Email App

Home Security Awareness iPhone Users at Risk of Hacking Through Email App
- Advertisement -

Must Read

Learnings from the Past: A tale of Indigenous Architecture and Sustainability

As much as we move ahead with time and technology, there is also a part of the past that...

7 Innovative Structures made from Recycled materials

Sustainability design has a wide spectrum of applicability. Beyond the typical materials like plastic and glass that are widely...

Human Centric Design

Architecture has a psychological effect on every human being, it could be both negative or positive. Due to a...
Nitin Gupta
Nitin Gupta
Nitin is a software engineer from Gurugram, Haryana. He is an avid reader, a tech-savvy and a sports enthusiast. He is quite versatile and loves to try his hands in every different field. Surely a fun person to hang out with!

We all see Apple as a gold standard for cybersecurity. So it might come as a surprise that more than half a billion iPhone and iPad users are under a risk of a cyber attack. The shocking report came last week from  ZecOps, a San Francisco-based mobile security forensics company. The report claims that Apple’s custom-built mail app is vulnerable to cyber-attacks.

How does the attack work?

Hackers were able to initiate the attack by sending a malicious email. This attack that puts iPhone users at risk arguably floods the memory of the device. In some cases, email without a body content was also able to trigger the vulnerability. The malicious email crashed the app and forced it to reboot. The reboot allows the hacker to get access to steal data on the device such as images and contacts stored on the phone. This vulnerability is limited only to iOS (iPads and iPhones) so the Mac users can have a breath of relief.


Are you safe?

Going by the report, every iOS version since iOS 6 is vulnerable to this exploit. Even the latest and newest iOS 13 shares the same vulnerability.  The vulnerability existed since 2018. The attackers have most probably used these vulnerabilities in the past as well. One good news out of this report suggests that third-party email apps are not under any such danger. Apps like google and outlook can still be used without any restrictions.

Were you attacked?

There are chances the attackers might also have tried to attack you. After any such attack, the mail app crashes. It also results in a temporary slowdown of this mobile application. A handful of unsuccessful attacks were also spotted by ZechOps. The attack gives the attacker the right to delete the email which was used for infiltrating the device. This essentially clears any backtracking possibility. In case of the failed attack, the victim will receive an email showing the message; “This message has no content”. Live pictures of the same are attached below

iphone attack

The Discovery

Investigating a sophisticated cyberattack attack in 2019 Zechops chief executive, Mr. Zuk Avraham came to know about this attack. He was able to identify more about this vulnerability based on data from “crash reports”. He claims that this attack is a part of a series of attacks that are being used. All these attacks when combined can give full remote access to hackers. Identifying one attack of this chain may serve as a serious blow to the attackers. But their identity is still unknown. Based on the data from crash reports he was also able to replicate the controlled crashes and study them in detail.

The Known victims

As per the current know information, the attackers have tried to attack only high profile users. Zechops also released a small list of suspected targets.

  • Individuals from a Fortune 500 organization in North America
  • An executive from a carrier in Japan 
  • A VIP from Germany
  • MSSPs from Saudi Arabia and Israel
  • A Journalist in Europe
  • Suspected: An executive from a Swiss enterprise

The list gives a clear indication that the attacks were carried out for victims around the globe. If the attack is limited to a specific area, identifying the perpetrator becomes easier.

Sudden Insurgency

With the majority of people working from their homes via their pc, the cybercrime rate is also rising. The number of cyberattacks has shot up especially in those apps which are helping people to work from home. Zoom is facing its biggest vulnerability issue ever. Google is also facing the occurrence of repeated security loops holes in their web browser and chrome. Recently Google removed several chrome extensions from the web store and 100+ android apps from the play store. Hackers are also using coronavirus news to spread false information via emails. With all this crime happening around the world, the news of iPhone users at risk should not be a complete shocker.

How to secure yourself?

One of the apple’s spokesperson has acknowledged a flaw in their software. Apple has already these vulnerabilities in its latest beta. Until a patch is available, it is advisable to disable the mailing app. Also, it is advisable not to open emails which raises suspicion. Always keep looking for clues like broken English, misspelled words, unusual fonts, or unknown email addresses. All these clues are usually present in fraud and malicious emails.

- Advertisement -



Please enter your comment!
Please enter your name here

Latest News

Human Centric Design

Architecture has a psychological effect on every human being, it could be both negative or positive. Due to a...
- Advertisement -

BadPower Attack: Your Smartphone May Explode While Charging

Recently, Chinese researchers have discovered rather a queer way to literally ‘destroy’ your smartphone through the mobile charger. This attack is known as the...

Learnings from the Past: A tale of Indigenous Architecture and Sustainability

As much as we move ahead with time and technology, there is also a part of the past that helps us learn new things....

TrickBot Anchor Malware Now Targets Linux Systems

Backdoor implementation is enhancing in every aspect. Cyber groups are employing techniques to execute malicious activities in the host system along with establishing persistence....

Rock of Ages 3: Make and Break Review

INTRODUCTION:- ROCK OF AGES 3: MAKE AND BREAK a Tower defence, racing type of video game played in single-player and multiplayer game mode. ROCK OF...

More Articles Like This

- Advertisement -
%d bloggers like this: