When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.
Whoever built the malware has also gone to great lengths to check that theyre not spotted.
The malware also runs a few checks before running, to verify its not installed in a research environment.
Håll dig säker när du surfar online på din iPhone eller iPad - här är de bästa VPN-tjänsterna för iPhone.
To deploy the malware, the hackers leveraged zero-day vulnerabilities on iOS, tracked as CVE-2023-32434 and CVE-2023-32435.
“The adversary behind Triangulation took great care to avoid detection,” the researchers said.
ViaTheHackerNews