{"id":5193,"date":"2023-06-02T01:29:00","date_gmt":"2023-06-02T06:29:00","guid":{"rendered":"https:\/\/www.incredigeek.com\/home\/?p=5193"},"modified":"2023-07-17T16:34:13","modified_gmt":"2023-07-17T21:34:13","slug":"operation-triangulation-ios-zero-click-apt-exploit-info","status":"publish","type":"post","link":"https:\/\/www.incredigeek.com\/home\/operation-triangulation-ios-zero-click-apt-exploit-info\/","title":{"rendered":"Operation Triangulation &#8211; iOS Zero-click APT Exploit Info"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<p>Quick Summary:  Operation Triangulation is an iOS zero-click exploit that will self destruct, looks to have been used since at least 2019, works on iOS 15.7, unsure if it works on iOS 16.  Can collect location, mic recordings, photos, and manipulate iMessages.  First point of entry is from an iMessage message, that compromises the device, after compromise, the message gets deleted.  <\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><a href=\"https:\/\/securelist.com\/operation-triangulation\/109842\/\">https:\/\/securelist.com\/operation-triangulation\/109842\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.kaspersky.com\/about\/press-releases\/2023_kaspersky-reports-on-new-mobile-apt-campaign-targeting-ios-devices\">https:\/\/www.kaspersky.com\/about\/press-releases\/2023_kaspersky-reports-on-new-mobile-apt-campaign-targeting-ios-devices<\/a><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><a href=\"https:\/\/arstechnica.com\/information-technology\/2023\/06\/clickless-ios-exploits-infect-kaspersky-iphones-with-never-before-seen-malware\/\">https:\/\/arstechnica.com\/information-technology\/2023\/06\/clickless-ios-exploits-infect-kaspersky-iphones-with-never-before-seen-malware\/<\/a><\/p>\n\n\n\n<p>Links for checking for infection.<\/p>\n\n\n\n<p><a href=\"https:\/\/securelist.com\/find-the-triangulation-utility\/109867\/\">https:\/\/securelist.com\/find-the-triangulation-utility\/109867\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/KasperskyLab\/triangle_check\">https:\/\/github.com\/KasperskyLab\/triangle_check<\/a><\/p>\n\n\n\n<p>The following is a list of C&amp;C domains from the securelist.com article.  Did a quick DNS lookup for each domain and they currently have the following records &amp; IP addresses.  Note that these can change at any time and some of the IP addresses are\/can be shared with other legitimate websites if it is on a shared hosting provider.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">addatamarket.net - sandy.ns.cloudflare.com, doug.ns.cloudflare.com - No A records, or TXT\nbackuprabbit.com - nelci.ns.cloudflare.com, morgan.ns.cloudflare.com - No A records, or TXT\nbusinessvideonews.com - ns2.dnsowl.com, ns3.dnsowl.com, ns1.dnsowl.com - 198.251.81.30, 209.141.38.71, 107.161.23.204\ncloudsponcer.com - Cloudflare, kipp.ns.cloudflare.com, joyce.ns.cloudflare.com\ndatamarketplace.net - ns78.domaincontrol.com, ns77.domaincontrol.com, 34.98.99.30\nmobilegamerstats.com - ns1.bitdomain.biz, No A records, TXT=v=spf1 redirect=_spf.mailhostbox.com\nsnoweeanalytics.com - cody.ns.cloudflare.com, arlee.ns.cloudflare.com - 104.21.76.6, 172.67.184.201\ntagclick-cdn.com - ns4.bitdomain.biz, ns3.bitdomain.biz, ns2.bitdomain.biz, ns1.bitdomain.biz - No A records, TXT=v=spf1 redirect=_spf.mailhostbox.com\"\ntopographyupdates.com - nero.ns.cloudflare.com, dalary.ns.cloudflare.com - 104.21.27.67, 172.67.141.199\nunlimitedteacup.com - nelci.ns.cloudflare.com, javon.ns.cloudflare.com - 104.21.55.58, 172.67.145.72\nvirtuallaughing.com - elaine.ns.cloudflare.com, braden.ns.cloudflare.com - 104.21.60.240, 172.67.202.140\nweb-trackers.com - dns1.registrar-servers.com, dns2.registrar-servers.com - 15.164.228.250\ngrowthtransport.com - ns3.dnsowl.com, ns2.dnsowl.com, ns1.dnsowl.com - 198.251.81.30, 107.161.23.204, 209.141.38.71\nanstv.net - ns64.domaincontrol.com, ns63.domaincontrol.com. - 93.90.223.185\nans7tv.net - ns37.domaincontrol.com,ns37.domaincontrol.com - 93.90.223.185<\/pre>\n\n\n\n<p>List of domains<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">addatamarket.net\nbackuprabbit.com\nbusinessvideonews.com\ncloudsponcer.com\ndatamarketplace.net\nmobilegamerstats.com\nsnoweeanalytics.com\ntagclick-cdn.com\ntopographyupdates.com\nunlimitedteacup.com\nvirtuallaughing.com\nweb-trackers.com\ngrowthtransport.com\nanstv.net\nans7tv.net<\/pre>\n\n\n\n<p>List of IPv4 addresses used<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">107.161.23.204\n198.251.81.30\n209.141.38.71\n34.98.99.30\n172.67.184.201\n104.21.76.6\n172.67.141.199\n104.21.27.67\n172.67.145.72\n104.21.55.58\n104.21.60.240\n172.67.202.140\n15.164.228.250\n209.141.38.71\n198.251.81.30\n93.90.223.185<\/pre>\n\n\n\n<p>Bash command to get an updated IP address list.  bad.txt contains all the above domain names.<\/p>\n\n\n\n<pre class=\"wp-block-code has-dark-gray-background-color has-background\"><code class=\"\">for i in `cat bad.txt` ; do dig $i a +short &gt;&gt; badips.lst; done<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\">Check DNS logs<\/h2>\n\n\n\n<p>If you have a DNS server, you can check to see if there has been any name resolution by using the following.  Change named.log to your dns log<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"># list=\"\"addatamarket.net\"\n\"backuprabbit.com\"\n\"businessvideonews.com\"\n\"cloudsponcer.com\"\n\"datamarketplace.net\"\n\"mobilegamerstats.com\"\n\"snoweeanalytics.com\"\n\"tagclick-cdn.com\"\n\"topographyupdates.com\"\n\"unlimitedteacup.com\"\n\"virtuallaughing.com\"\n\"web-trackers.com\"\n\"growthtransport.com\"\n\"anstv.net\"\n\"ans7tv.net\"\"\n\n# for domain in $list; do echo $domain &amp;&amp; sudo grep -i $domain \/var\/log\/named.log; done<\/pre>\n\n\n\n<h2 class=\"wp-block-heading\">Setup Mikrotik capture traffic<\/h2>\n\n\n\n<p>Mikrotik packet sniffer settings to capture traffic coming or going to the above IP addresses.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">\/tool sniffer\nset file-limit=32000KiB file-name=Triangulation filter-ip-address=\"107.161.23.20\\\n    4\/32,198.251.81.30\/32,209.141.38.71\/32,34.98.99.30\/32,172.67.184.201\/32,104.\\\n    21.76.6\/32,172.67.141.199\/32,104.21.27.67\/32,172.67.145.72\/32,104.21.55.58\/3\\\n    2,104.21.60.240\/32,172.67.202.140\/32,15.164.228.250\/32,209.141.38.71\/32,198.\\\n    251.81.30\/32,93.90.223.185\/32\" <\/pre>\n\n\n\n<p>You can then start the sniffer by running Tools -&gt; Packet Sniffer Settings -&gt; Start <\/p>\n\n\n\n<p>or run<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">\/tool\/sniffer\/start<\/pre>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Resolution<\/h2>\n\n\n\n<p>Apple issued an update that fixes the kernel part of the vulnerability.  <\/p>\n\n\n\n<p><a href=\"https:\/\/securelist.com\/triangledb-triangulation-implant\/110050\/\">https:\/\/securelist.com\/triangledb-triangulation-implant\/110050\/<\/a><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Quick Summary: Operation Triangulation is an iOS zero-click exploit that will self destruct, looks to have been used since at least 2019, works on iOS 15.7, unsure if it works on iOS 16. Can collect location, mic recordings, photos, and &hellip; <a href=\"https:\/\/www.incredigeek.com\/home\/operation-triangulation-ios-zero-click-apt-exploit-info\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[420,573],"tags":[322,1509,1507,1244,503,1508],"class_list":["post-5193","post","type-post","status-publish","format-standard","hentry","category-hacking","category-security","tag-apt","tag-cc","tag-exploits","tag-ios","tag-security","tag-triangulation"],"_links":{"self":[{"href":"https:\/\/www.incredigeek.com\/home\/wp-json\/wp\/v2\/posts\/5193","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.incredigeek.com\/home\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.incredigeek.com\/home\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.incredigeek.com\/home\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.incredigeek.com\/home\/wp-json\/wp\/v2\/comments?post=5193"}],"version-history":[{"count":11,"href":"https:\/\/www.incredigeek.com\/home\/wp-json\/wp\/v2\/posts\/5193\/revisions"}],"predecessor-version":[{"id":5312,"href":"https:\/\/www.incredigeek.com\/home\/wp-json\/wp\/v2\/posts\/5193\/revisions\/5312"}],"wp:attachment":[{"href":"https:\/\/www.incredigeek.com\/home\/wp-json\/wp\/v2\/media?parent=5193"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.incredigeek.com\/home\/wp-json\/wp\/v2\/categories?post=5193"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.incredigeek.com\/home\/wp-json\/wp\/v2\/tags?post=5193"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}