In June of this year, Kaspersky received attention for its security report, which said that they had discovered an iMessage vulnerability, which was very complex and high-end. Through this vulnerability, hackers only need an iMessage text message to obtain the highest privilege of the iPhone, so as to directly obtain and monitor user information. Kaspersky named the vulnerability "operation triangulation". Now, for the first time, Kaspersky security researchers have revealed the details of "operation triangulation".
Kaspersky security researchers say that the vulnerability is so insidious that it's hard to even imagine how it was discovered. Because judging by Kaspersky's research, it is almost impossible for anyone other than Apple and Arm to be known. It is precisely this concealment that has led to the fact that this vulnerability has been active from 2019 to December 2022.
What is known is that hackers have reserved a backdoor in thousands of iPhones, and this backdoor is at the hardware level to directly obtain the highest privileges of iPhones. And if you want to use backdoors, you must have a clear understanding of the underlying mechanism of Apple products. That's why Kaspersky security researchers feel that this vulnerability is unlikely to be accessed by anyone other than Apple and Arm.