

The deployment of the spyware is completely hidden and requires no action from the user. The attack is carried out using an invisible iMessage with a malicious attachment, which, using a number of vulnerabilities in the iOS operating system, is executed on a device and installs spyware. The purpose of the attack is the inconspicuous placing of spyware into the iPhones of employees of at least our company – both middle and top management. Our experts have discovered an extremely complex, professional targeted cyberattack that uses Apple’s mobile devices.

I’ve some big news about a cyber-incident we’ve uncovered…
