Close Menu
InfovistarInfovistar
  • AI & ML
  • Cybersecurity
  • Startup
  • Tech News
  • Insights
    • Web Development
    • AWS and Cloud
    • Blockchain and Cryptocurrency
    • Chatbots
    • Technology
    • DevOps
    • Resources
  • Courses
    • Machine Learning
      • Python Tutorial
      • TensorFlow Tutorial
      • OpenCV
    • DSA
      • Data Structures
    • Web Development
      • PHP Tutorial
      • CodeIgniter Tutorial
      • CodeIgniter 4 Tutorial
      • CodeIgniter 4 AJAX
      • JavaScript
    • Mobile Development
      • Android Tutorial
  • Tools
    • Beautifier
      • HTML Beautifier
      • JavaScript Beautifier
      • CSS Beautifier
    • Online Compilers
      • Python Compiler
      • Java Compiler
      • JavaScript Editor
      • PHP Compiler
      • C++ Compiler
      • C Compiler
    • Image Optimization
      • Image Compressor
      • JPEG to PNG
      • PNG to JPEG
      • WebP to PNG

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Ransomware 2.0: How AI Is Changing Cyber Attacks Forever

April 18, 2025

Lovable AI Faces Major Threat from VibeScamming Attacks

April 10, 2025

Top Trends to Include in Your Strategy for Digital Marketing in 2025

April 5, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram Pinterest Vimeo
InfovistarInfovistar
  • AI & ML
  • Cybersecurity
  • Startup
  • Tech News
  • Insights
    • Web Development
    • AWS and Cloud
    • Blockchain and Cryptocurrency
    • Chatbots
    • Technology
    • DevOps
    • Resources
  • Courses
    • Machine Learning
      • Python Tutorial
      • TensorFlow Tutorial
      • OpenCV
    • DSA
      • Data Structures
    • Web Development
      • PHP Tutorial
      • CodeIgniter Tutorial
      • CodeIgniter 4 Tutorial
      • CodeIgniter 4 AJAX
      • JavaScript
    • Mobile Development
      • Android Tutorial
  • Tools
    • Beautifier
      • HTML Beautifier
      • JavaScript Beautifier
      • CSS Beautifier
    • Online Compilers
      • Python Compiler
      • Java Compiler
      • JavaScript Editor
      • PHP Compiler
      • C++ Compiler
      • C Compiler
    • Image Optimization
      • Image Compressor
      • JPEG to PNG
      • PNG to JPEG
      • WebP to PNG
Subscribe
InfovistarInfovistar
Home » Russian hackers are using iOS and Chrome flaws to steal data
Cybersecurity

Russian hackers are using iOS and Chrome flaws to steal data

InfovistarBy InfovistarAugust 30, 2024No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Russian hackers are using iOS and Chrome flaws to steal data
Share
Facebook Twitter LinkedIn Pinterest Email

Recent reports reveal that Russian hackers are using serious flaws in iOS and Chrome to steal sensitive user data. The notorious APT29 group, also known as “Midnight Blizzard,” has been exploiting vulnerabilities found in both iOS and Chrome browsers to target unsuspecting users. The scary part? These tactics are nearly identical to those used by commercial spyware vendors like NSO Group and Intellexa. Let’s dive into why these attacks are so dangerous and what you can do to protect your data.

Who Are APT29, and What Are They Doing?

APT29, a state-sponsored Russian hackers group, has been leveraging flaws in iOS and Chrome browsers to carry out cyberattacks between November 2023 and July 2024. They’ve been using known exploits that affect iOS versions older than 16.6.1 and Chrome on Android versions from m121 to m123. Hackers continue to target users who haven’t updated their devices, even though patches for these flaws are already available.

The hackers primarily targeted websites belonging to the Mongolian government, employing a sneaky cyberattack method known as “watering hole” tactics. Hackers compromise legitimate websites with malicious code during these attacks, delivering harmful payloads to visitors meeting specific criteria. In this case, the criteria were vulnerable iOS and Android devices.

Why Are These Attacks So Dangerous?

Google’s Threat Analysis Group (TAG) has been closely monitoring APT29’s activities, noting their long history of exploiting zero-day and n-day vulnerabilities. They’ve been particularly adept at using iOS WebKit flaws to steal browser cookies from iPhone users. For instance, they exploited a vulnerability, CVE-2023-41993, which was previously used as a zero-day by the commercial spyware vendor Intellexa.

Similarly, APT29 used Chrome exploits to attack Android users, stealing sensitive information such as cookies, passwords, and other data stored in Chrome browsers. These hacks are not just sophisticated; they’re specifically tailored to extract highly personal information from your device, making them incredibly dangerous.

Also read | How the Qilin Ransomware Attack Exploited VPN Credentials and Stole Chrome Data

What Can You Do to Protect Your Data?

The good news is that patches for these vulnerabilities have been released. However, they only work if you’ve installed them. Here’s what you can do to keep your data safe:

  • Update Your Devices Regularly: Make sure your iPhone or Android device is updated to the latest version. These updates contain essential security patches that protect against the vulnerabilities exploited by hackers.
  • Use Strong Passwords and Change Them Often: Always use complex passwords for your accounts, and consider changing them periodically to further protect your information.
  • Be Wary of Suspicious Links and Websites: Avoid clicking on unknown links or visiting suspicious websites, as they can be compromised and serve as a gateway for these exploits.
  • Enable Two-Factor Authentication (2FA): Adding an extra layer of security to your accounts can significantly reduce the risk of unauthorized access, even if your passwords are compromised.

FAQs

1. Who are APT29, and why are they targeting iOS and Chrome?
The Russian hackers group APT29, also known as “Midnight Blizzard,” targets iOS and Chrome browsers, stealing sensitive data.

2. How can I protect my data from these hacks?
The best way to protect your data is by regularly updating your devices, using strong passwords, avoiding suspicious websites, and enabling two-factor authentication.

3. What are “watering hole” attacks?
Watering hole attacks involve compromising legitimate websites with malicious code designed to target specific visitors, such as those using outdated software.

5. Why should I be concerned if my device is running an outdated version?
Outdated versions of iOS and Chrome are vulnerable to these sophisticated exploits, putting your personal information, like cookies and passwords, at risk.

Cybersecurity
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleBharatPe Launches New UPI App: Here’s What You Need to Know!
Next Article Instagram Launches Creator Lab in India: How It Will Help Aspiring Creators
Infovistar
  • Website
  • Facebook
  • X (Twitter)
  • Instagram
  • LinkedIn

Related Posts

Cybersecurity

Ransomware 2.0: How AI Is Changing Cyber Attacks Forever

April 18, 2025
Cybersecurity

Lovable AI Faces Major Threat from VibeScamming Attacks

April 10, 2025
Cybersecurity

Hackers Target Mac Users with Apple ID Phishing Scam

March 28, 2025
Add A Comment
Leave A Reply Cancel Reply

You must be logged in to post a comment.

Blog Categories
  • AI and ML (93)
  • Android (4)
  • AWS and Cloud (7)
  • Blockchain and Cryptocurrency (6)
  • Case Study (7)
  • Chatbots (5)
  • Cybersecurity (71)
  • DevOps (5)
  • Object-Oriented Programming (2)
  • Payment Gateway (4)
  • Resources (5)
  • Search Engine Optimization (3)
  • Startup (34)
  • Tech News (70)
  • Tech Tips (12)
  • Technology (79)
  • Trading (6)
  • Web Development (23)
Top Posts

Google is rolling out Identity Check Feature to Android 15

January 25, 20252,370 Views

How to Integrate Google Gemini to WhatsApp

February 16, 20241,658 Views

OpenAI Unveils Web-Based AI Agent Operator for Task Automation

January 24, 20251,502 Views
Stay In Touch
  • Facebook
  • YouTube
  • WhatsApp
  • Twitter
  • Instagram
  • Pinterest
  • LinkedIn
Latest Articles

Subscribe to Updates

Get the latest tech news from FooBar about tech, design and biz.

Most Popular

Google is rolling out Identity Check Feature to Android 15

January 25, 20252,370 Views

How to Integrate Google Gemini to WhatsApp

February 16, 20241,658 Views

OpenAI Unveils Web-Based AI Agent Operator for Task Automation

January 24, 20251,502 Views
Our Picks

Ransomware 2.0: How AI Is Changing Cyber Attacks Forever

April 18, 2025

Lovable AI Faces Major Threat from VibeScamming Attacks

April 10, 2025

Top Trends to Include in Your Strategy for Digital Marketing in 2025

April 5, 2025

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

Facebook X (Twitter) Instagram Pinterest
  • About Us
  • Contact Us
  • Tools
  • Terms & Conditions
  • Privacy Policy
  • AdSense Disclaimer
© 2025 Infovistar. Designed and Developed by Infovistar.

Type above and press Enter to search. Press Esc to cancel.

Go to mobile version