Published on November 5, 2024. EST READ TIME: 2 minutes
Cybersecurity experts have uncovered a sophisticated version of the LightSpy spyware, now specifically targeting iPhones with expanded surveillance functionalities. This updated variant utilizes a plugin-based architecture, increasing its plugins from 12 to 28, allowing it to extract a wide array of sensitive data, including Wi-Fi network information, screenshots, location data, iCloud Keychain contents, and communications from applications such as WhatsApp, WeChat, and Telegram. Alarmingly, certain plugins are equipped with destructive features, enabling the deletion of media files, SMS messages, and even rendering the device inoperable by preventing it from booting up. Notably, some plugins possess destructive capabilities, such as deleting media files and preventing device boot-up. The spyware exploits known iOS vulnerabilities, emphasizing the critical need for users to keep their devices updated to mitigate such threats.
North Korea's Lazarus Group Rakes in $3 Million: Unveiling Cybercrime's Financial Motivations
Read More 2 min read
Security Vulnerability: Windows Hello Fingerprint Authentication Bypassed on Popular Laptops
Read More 2 min read
Indian Startup Hack-for-Hire: Navigating the Complexities of Ethical Hacking
Read More 2 min read
North Korean Hackers Pose as Job Recruiters in Cyber Espionage Campaign
Read More 2 min read
Analysis Reveals: Bad Bots Constitute a Staggering 73% of Internet Traffic
Read More 2 min read
Menu