Vue lecture

A Possible US Government iPhone-Hacking Toolkit Is Now In the Hands of Foreign Spies, Criminals

Security researchers say a highly sophisticated iPhone exploitation toolkit dubbed "Coruna," which possibly originated from a U.S. government contractor, has spread from suspected Russian espionage operations to crypto-stealing criminal campaigns. Apple has patched the exploited vulnerabilities in newer iOS versions, but tens of thousands of devices may have already been compromised. An anonymous reader quotes an excerpt from Wired's report: Security researchers at Google on Tuesday released a report describing what they're calling "Coruna," a highly sophisticated iPhone hacking toolkit that includes five complete hacking techniques capable of bypassing all the defenses of an iPhone to silently install malware on a device when it visits a website containing the exploitation code. In total, Coruna takes advantage of 23 distinct vulnerabilities in iOS, a rare collection of hacking components that suggests it was created by a well-resourced, likely state-sponsored group of hackers. In fact, Google traces components of Coruna to hacking techniques it spotted in use in February of last year and attributed to what it describes only as a "customer of a surveillance company." Then, five months later, Google says a more complete version of Coruna reappeared in what appears to have been an espionage campaign carried out by a suspected Russian spy group, which hid the hacking code in a common visitor-counting component of Ukrainian websites. Finally, Google spotted Coruna in use yet again in what seems to have been a purely profit-focused hacking campaign, infecting Chinese-language crypto and gambling sites to deliver malware that steals victims cryptocurrency. Conspicuously absent from Google's report is any mention of who the original surveillance company "customer" that deployed Coruna may have been. But the mobile security company iVerify, which also analyzed a version of Coruna it obtained from one of the infected Chinese sites, suggests the code may well have started life as a hacking kit built for or purchased by the US government. Google and iVerify both note that Coruna contains multiple components previously used in a hacking operation known as "Triangulation" that was discovered targeting Russian cybersecurity firm Kaspersky in 2023, which the Russian government claimed was the work of the NSA. (The US government didn't respond to Russia's claim.) Coruna's code also appears to have been originally written by English-speaking coders, notes iVerify's cofounder Rocky Cole. "It's highly sophisticated, took millions of dollars to develop, and it bears the hallmarks of other modules that have been publicly attributed to the US government," Cole tells WIRED. "This is the first example we've seen of very likely US government tools -- based on what the code is telling us -- spinning out of control and being used by both our adversaries and cybercriminal groups." Regardless of Coruna's origin, Google warns that a highly valuable and rare hacking toolkit appears to have traveled through a series of unlikely hands, and now exists in the wild where it could still be adopted -- or adapted -- by any hacker group seeking to target iPhone users. "How this proliferation occurred is unclear, but suggests an active market for 'second hand' zero-day exploits," Google's report reads. "Beyond these identified exploits, multiple threat actors have now acquired advanced exploitation techniques that can be re-used and modified with newly identified vulnerabilities."

Read more of this story at Slashdot.

  •  

Apple Introduces iPhone 17e With MagSafe and A19

Apple today announced the iPhone 17e with support for MagSafe and an upgraded A19 chip. The base model also gets a bump to 256GB of storage at $599, and Apple is equipping the device with its new scratch-resistant Ceramic Shield 2 glass that's supposedly 3x more durable than the 16e. Macworld reports: MagSafe would normally mean significantly faster wireless charging speeds too: the 16e is capped at 7.5W, whereas recent iPhones can wirelessly charge using MagSafe at up to 22W or even 25W. Unfortunately the iPhone 17e has not been given access to the full extent of MagSafe's powers in this regard, and has a limit of 15W. That's the same as MagSafe on the iPhones 12 through 15, and remains an improvement on the 16e, but is still disappointing. [...] It was also expected that the 17e would get a new processor, as this is a standard upgrade for almost every refresh of almost every Apple product. The iPhone 16e came with an A18 chip; the 17 has an A19, which, according to Apple, "delivers exceptional performance for everything users do." Of course that depends on the user and their needs, and it's important to point out that, just like last year, Apple has chosen to use "binned" units of the chip in order to save money. Binned chips have failed manufacturing tests in some minor way and don't have the full complement of cores. [...] And although the cameras are still disappointingly few in number -- one on the front and one on the back -- the wording for the portrait mode has been updated from "Portrait mode with Depth Control" (the same as on the iPhone 12) to "Next-generation portraits with Focus and Depth Control" (same as on the iPhone 17). This appears to highlight the fact that you can change the focus point. The 17e is available in white, black, and soft pink starting at $599.

Read more of this story at Slashdot.

  •  

La dernière nouveauté Apple Music arrive sur Android (et personne ne comprend pourquoi)

Nouveauté de la bêta d'iOS 26.4, la fonctionnalité « Playlist Playground », qui génère des playlists avec de l'intelligence artificielle, a fait une arrivée surprise dans la version bêta d'Apple Music sur Android. Une première pour Apple qui réserve habituellement ses fonctions IA à ses propres appareils avec des modèles 100 % locaux.

  •  
❌