{"id":98331,"date":"2023-06-23T13:54:20","date_gmt":"2023-06-23T20:54:20","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=98331"},"modified":"2023-07-27T01:07:45","modified_gmt":"2023-07-27T08:07:45","slug":"apple-patches-vulns-used-to-infect-russian-iphones-with-triangledb-malware","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-vulns-used-to-infect-russian-iphones-with-triangledb-malware\/","title":{"rendered":"Apple patches vulns used to infect Russian iPhones with TriangleDB malware"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter wp-image-98369 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/06\/Apple-software-update-red-critical-urgent-running-from-TriangleDB-malware-600x300-1.jpg\" alt=\"\" width=\"600\" height=\"300\" \/><\/p>\n<p>On Wednesday, June 21, Apple released updates to its mobile, watch, and desktop operating systems. Both iOS 16.5.1 and iPadOS 16.5.1 include a fix for &#8220;an issue that prevents charging with the Lightning to USB 3 Camera Adapter.&#8221;<\/p>\n<p>However, the primary purpose of the updates was providing security fixes for three &#8220;actively exploited&#8221; vulnerabilities. Two of those vulnerabilities had reportedly been used in recurring attacks to infect Russians&#8217; iPhones with spyware.<\/p>\n<p>Let&#8217;s take a look at the highlights of each update.<\/p>\n<p><em>In this article:<\/em><\/p>\n<ul>\n<li><a href=\"#0d\">Apple addresses 3 zero-days, 2 of which were used against Russian targets<\/a>\n<ul>\n<li><a href=\"#optri\">Operation Triangulation, and TriangleDB iOS (and macOS?) malware<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"#vent\">macOS Ventura 13.4.1<\/a><\/li>\n<li><a href=\"#mont\">macOS Monterey 12.6.7, <\/a><a href=\"#bs\">macOS Big Sur 11.7.8, and <\/a><a href=\"#saf\">Safari 16.5.1<\/a><\/li>\n<li><a href=\"#16\">iOS 16.5 and iPadOS 16.5<\/a><\/li>\n<li><a href=\"#15\">iOS 15.7.6 and iPadOS 15.7.6<\/a><\/li>\n<li><a href=\"#wat\">watchOS 9.5<\/a><\/li>\n<li><a href=\"#8\">watchOS 8.8.1 \u2014 first security update in 11 months<\/a><\/li>\n<li><a href=\"#tv\">No tvOS, <\/a><a href=\"#hom\">audioOS, Studio Display updates<\/a><\/li>\n<li><a href=\"#keys\">Key takeaways<\/a><\/li>\n<li><a href=\"#learnmore\">How can I learn more?<\/a><a name=\"0d\"><\/a><\/li>\n<\/ul>\n<h3>Apple addresses 3 zero-days, 2 of which were used against Russian targets<\/h3>\n<p>In total, Apple addressed <strong>three &#8220;actively exploited&#8221; (i.e. in-the-wild) vulnerabilities<\/strong> in this week&#8217;s updates. The kernel vulnerability (CVE-2023-32434) was addressed for all supported versions of macOS, iOS, iPadOS, and watchOS. One of the WebKit vulnerabilities (CVE-2023-32439) was patched for all supported versions of macOS, iOS, and iPadOS. A second WebKit vulnerability (CVE-2023-32435) was only patched for iOS and iPadOS 15.<\/p>\n<blockquote><p><strong>Kernel<br \/>\n<\/strong><\/p>\n<p>Impact: An app may be able to execute arbitrary code with kernel privileges. <span style=\"color: #ff0000;\">Apple is aware of a report that this issue may have been actively exploited<\/span> against versions of iOS released before iOS 15.7.<\/p>\n<p>Description: An integer overflow was addressed with improved input validation.<\/p>\n<p>CVE-2023-32434: Georgy Kucherin (@kucher1n), Leonid Bezvershenko (@bzvr_), and Boris Larin (@oct0xor) of Kaspersky<\/p>\n<p>&nbsp;<\/p>\n<p><strong>WebKit<\/strong><\/p>\n<p>Impact: Processing maliciously crafted web content may lead to arbitrary code execution. <span style=\"color: #ff0000;\">Apple is aware of a report that this issue may have been actively exploited.<\/span><\/p>\n<p>Description: A type confusion issue was addressed with improved checks.<\/p>\n<p>WebKit Bugzilla: 256567<br \/>\nCVE-2023-32439: an anonymous researcher<\/p>\n<p>&nbsp;<\/p>\n<p><strong>WebKit<\/strong><\/p>\n<p>Available for: iOS 15.7.7 and iPadOS 15.7.7 \u2014 for iPhone 6s (all models), iPhone 7 (all models), iPhone SE (1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch (7th generation)<\/p>\n<p>Impact: Processing maliciously crafted web content may lead to arbitrary code execution. <span style=\"color: #ff0000;\">Apple is aware of a report that this issue may have been actively exploited<\/span> against versions of iOS released before iOS 15.7.<\/p>\n<p>Description: A use-after-free issue was addressed with improved memory management.<\/p>\n<p>WebKit Bugzilla: 251890<br \/>\nCVE-2023-32435: Georgy Kucherin (@kucher1n), Leonid Bezvershenko (@bzvr_), and Boris Larin (@oct0xor) of Kaspersky<\/p><\/blockquote>\n<p>You may note that Apple credits a trio of Kaspersky researchers for both the kernel vulnerability and the second WebKit vulnerability. <a name=\"optri\"><\/a>Kaspersky is a multinational antivirus company with its main headquarters in Moscow, Russia. There&#8217;s a story behind the discovery of these vulnerabilities.<\/p>\n<h4><strong>Operation Triangulation, and TriangleDB iOS (and macOS?) malware<\/strong><\/h4>\n<p>On June 1, Russia&#8217;s Federal Security Service (FSB) publicly <a href=\"https:\/\/www.reuters.com\/technology\/russias-fsb-says-us-nsa-penetrated-thousands-apple-phones-spy-plot-2023-06-01\/\" target=\"_blank\" rel=\"noopener\">alleged<\/a> that an espionage operation had compromised several thousands iPhones in Russia, and claimed that it believed that Apple worked closely with the U.S. National Security Agency (NSA) on the spying campaign. On the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/new-security-and-privacy-features-in-macos-sonoma-ios-17-and-ipados-17-2\/\">June 15 episode<\/a> of the <a href=\"https:\/\/podcast.intego.com\/\">Intego Mac Podcast<\/a>, we discussed the implausibility of the allegation that Apple had collaborated with a U.S. spy agency (jump to 6:15 in the player below, or <a href=\"https:\/\/www.intego.com\/mac-security-blog\/new-security-and-privacy-features-in-macos-sonoma-ios-17-and-ipados-17-2\/#:~:text=Stories%20about%20Apple%20assisting%20the%20US%20government%20to%20hack%20the%20Kremlin%20are%20fake%20news\">jump to that part of the episode transcript<\/a>).<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/player.fireside.fm\/v2\/GegHgcrH+SgzEDymq?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>The same day, Kaspersky&#8217;s CEO <a href=\"https:\/\/usa.kaspersky.com\/blog\/triangulation-attack-on-ios\/28444\/\" target=\"_blank\" rel=\"noopener nofollow\">claimed<\/a> that &#8220;both middle and top management&#8221; at Kaspersky had found evidence of infections on their iPhones. Reportedly, the infections were delivered by exploiting &#8220;a number of vulnerabilities&#8221; in iOS, via &#8220;an invisible iMessage with a malicious attachment.&#8221; Kaspersky released detailed reports referring to the campaign as <a href=\"https:\/\/securelist.com\/operation-triangulation\/109842\/\" target=\"_blank\" rel=\"noopener nofollow\">Operation Triangulation<\/a>, and the iOS spyware as Triangulation or <a href=\"https:\/\/securelist.com\/triangledb-triangulation-implant\/110050\/\" target=\"_blank\" rel=\"noopener nofollow\">TriangleDB<\/a>. They claimed that the attack was &#8220;ongoing&#8221; as of June 1, but that the newest iOS version they had seen infected was iOS 15.7 (which was released in September 2022\u2014this underscores the importance of staying up to date with all Apple security updates). Kaspersky indicated that other vulnerabilities besides those listed above may have been used in this campaign, &#8220;most likely&#8221; including CVE-2022-46690, which was <a href=\"https:\/\/support.apple.com\/en-us\/HT213530\" target=\"_blank\" rel=\"noopener\">fixed in iOS 16.2<\/a> (but was not listed as &#8220;actively exploited&#8221;).<\/p>\n<p>Although a Mac version of the TriangleDB malware has not yet been discovered, there are hints in the iOS version&#8217;s code that a macOS version may also exist.<\/p>\n<p>If any doubt remained about whether some real-world vulnerabilities had been exploited as part of a cyber-espionage campaign, Apple dispelled that doubt with the release of its patches on Wednesday, June 21. Apple credited three of the Kaspersky researchers who did the technical research and reporting on the vulnerabilities earlier this month, and noted that both vulnerabilities &#8220;may have been actively exploited&#8221;\u2014which sounds wishy-washy, but is as clear as Apple ever gets when there is clear confirmation of active exploitation in the wild.<a name=\"vent\"><\/a><\/p>\n<h3>macOS Ventura 13.4.1<\/h3>\n<p><strong>Available for:<\/strong><br \/>\nAll supported Macs currently running macOS Ventura<\/p>\n<p>As of this moment, it appears that Apple addressed only two vulnerabilities in this update: CVE-2023-32434 and CVE-2023-32439. However, Apple sometimes updates past advisories with additional disclosures. See Apple&#8217;s page <a href=\"https:\/\/support.apple.com\/en-us\/HT213813\" target=\"_blank\" rel=\"noopener\">about the security content of macOS Ventura 13.4.1<\/a>.<\/p>\n<p>Users of macOS Ventura can get this update by going to <strong>System Settings<\/strong> &gt; <strong>General<\/strong> &gt; <strong>Software Update<\/strong>.<\/p>\n<p>If your Mac is running macOS Mojave, Catalina, Big Sur, or Monterey, and your Mac is compatible with macOS Ventura, you can upgrade to macOS Ventura by going to <strong>System Preferences<\/strong> &gt; <strong>Software Update<\/strong>. If your Mac is running macOS High Sierra or older and is compatible with macOS Ventura, look for macOS Ventura in the Mac App Store and download it from there.<a name=\"mont\"><\/a><a name=\"bs\"><\/a><a name=\"saf\"><\/a><\/p>\n<h3>macOS Monterey 12.6.7, macOS Big Sur 11.7.8, and Safari 16.5.1<\/h3>\n<p><strong>Available for:<\/strong><br \/>\nAll supported Macs currently running macOS Monterey or macOS Big Sur<\/p>\n<p>As of this moment, it appears that Apple addressed the same two vulnerabilities for macOS Monterey and macOS Big Sur that it addressed in macOS Ventura. However, Apple sometimes updates past advisories with additional disclosures. Like usual, Apple released a separate Safari update addressing the WebKit vulnerability, rather than bundling the fix directly into the Monterey and Big Sur updates as it does with the current macOS version. See Apple&#8217;s pages about the security content of <a href=\"https:\/\/support.apple.com\/kb\/HT213810\" target=\"_blank\" rel=\"noopener\">macOS Monterey 12.6.7<\/a>, <a href=\"https:\/\/support.apple.com\/kb\/HT213809\" target=\"_blank\" rel=\"noopener\">macOS Big Sur 11.7.8<\/a>, and <a href=\"https:\/\/support.apple.com\/kb\/HT213816\" target=\"_blank\" rel=\"noopener\">Safari 16.5.1 for macOS Monterey and Big Sur<\/a>.<\/p>\n<p>Notably, while macOS Monterey and macOS Big Sur got the same patches as macOS Ventura this time, Apple frequently chooses to withhold many security patches from the two previous Mac operating systems. If you&#8217;re still running Monterey or Big Sur on a Mac that&#8217;s compatible with Ventura\u2014or even <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-keep-older-macs-secure-a-geeky-approach\/\">a Mac that isn&#8217;t officially compatible, but can be upgraded anyway<\/a>\u2014it&#8217;s best to upgrade to Ventura to significantly improve your Mac&#8217;s security. But in the mean time, you can get this week&#8217;s updates by going to <strong>System Preferences<\/strong> &gt; <strong>Software Update<\/strong>.<a name=\"16\"><\/a><\/p>\n<h3>iOS 16.5.1 and iPadOS 16.5.1<\/h3>\n<p><strong>Available for:<\/strong><br \/>\niPhone 8 and later, iPad Pro (all models), iPad Air 3rd generation and later, iPad 5th generation and later, and iPad mini 5th generation and later<\/p>\n<p><strong>Improvements and bug fixes:<\/strong><\/p>\n<ul>\n<li>Fixes an issue that prevents charging with the Lightning to USB 3 Camera Adapter<\/li>\n<\/ul>\n<p><strong>Security-related fixes and updates:<\/strong><br \/>\nAs of this moment, it appears that Apple addressed the same two vulnerabilities for iOS 16.5.1 and iPadOS 16.5.1 that it addressed in macOS Ventura. However, Apple sometimes updates past advisories with additional disclosures. See Apple&#8217;s page <a href=\"https:\/\/support.apple.com\/en-us\/HT213814\" target=\"_blank\" rel=\"noopener\">about the security content of iOS 16.5.1 and iPadOS 16.5.1<\/a>.<\/p>\n<p>To get the latest update, you can connect your device to your Mac to back it up and install the update. Alternatively, you can download these updates over the air (i.e. directly onto the device) by going to <strong>Settings<\/strong> &gt; <strong>General<\/strong> &gt; <strong>Software Update<\/strong>\u00a0on your device.<a name=\"15\"><\/a><\/p>\n<h3>iOS 15.7.7 and iPadOS 15.7.7<\/h3>\n<p><strong>Available for:<\/strong><br \/>\niPhone 6s (all models), iPhone 7 (all models), iPhone SE (1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch (7th generation)<\/p>\n<p>Both iOS 15.7.7 and iPadOS 15.7.7 include fixes for all three vulnerabilities that Apple patched this week.<\/p>\n<p>Notably, the patch for one of the WebKit vulnerabilities (CVE-2023-32435)\u2014which was apparently used in an exploit chain to infect iPhones in Russia\u2014was only released for the 15.7.7 operating systems. Presumably, this means that the vulnerability either does not exist, or is not exploitable, in iOS 16.5.1 or the other operating systems Apple patched this week.<\/p>\n<p>Kaspersky researchers noted that Operation Triangulation vulnerabilities were successfully exploited up through and including iOS 15.7, while Apple&#8217;s wording implies that the two Kaspersky-reported vulnerabilities affect versions of iOS older than 15.7.<\/p>\n<p>Apple sometimes updates past advisories with additional disclosures. See Apple&#8217;s page <a href=\"https:\/\/support.apple.com\/kb\/HT213811\" target=\"_blank\" rel=\"noopener\">about the security content of iOS 15.7.7 and iPadOS 15.7.7<\/a>.<\/p>\n<p>To get this update, you can connect your device to your Mac to back it up and install the update. Alternatively, you can\u00a0download these updates over the air by going to <strong>Settings<\/strong> &gt; <strong>General<\/strong> &gt; <strong>Software Update<\/strong> on your device.<a name=\"wat\"><\/a><\/p>\n<h3>watchOS 9.5.2<\/h3>\n<p><strong>Available for:<\/strong><br \/>\nApple Watch Series 4 and later<\/p>\n<p>As of this moment, it appears that this week&#8217;s watchOS update a fix for a single vulnerability: CVE-2023-32434, the kernel vulnerability exploited by Operation Triangulation.<\/p>\n<p>Apple&#8217;s watchOS advisories for this week do not mention CVE-2023-32439, the WebKit vulnerability that was patched for all supported versions of macOS, iOS, and iPadOS. Presumably this means that watchOS was not impacted by this particular WebKit issue.<\/p>\n<p>Astute readers may note that we haven&#8217;t previously covered watchOS 9.5.1. That update was released by itself (not alongside any other OS updates) on May 30. It addressed &#8220;improvements and bug fixes,&#8221; and Apple indicated at the time that it &#8220;has no published CVE entries.&#8221; This likely means that watchOS 9.5.1 did not include any security updates\u2014but it could theoretically mean that Apple quietly fixed minor security issues that did not get a CVE number assigned.<\/p>\n<p>Apple sometimes updates past advisories with additional disclosures. See Apple&#8217;s page <a href=\"https:\/\/support.apple.com\/kb\/HT213812\" target=\"_blank\" rel=\"noopener noreferrer\">about the security content of watchOS 9.5.2<\/a>.<\/p>\n<p>To install this update, make sure your iPhone is up to date first, that both your phone and watch are connected to the same Wi-Fi network, and that the watch has at least a 50% charge. Then open the Watch app on your phone and tap <strong>General<\/strong> &gt; <strong>Software Update<\/strong>.<a name=\"8\"><\/a><\/p>\n<h3>watchOS 8.8.1 \u2014 first security update in 11 months<\/h3>\n<p><strong>Available for:<\/strong><br \/>\nApple Watch Series 3<\/p>\n<p>Color me shocked\u2014Apple has finally released a watchOS 8 security update, 11 months after the last one. Apple was still selling the Apple Watch Series 3 refurbished until just a few months ago, in March, despite it missing major security patches. For unknown reasons, Apple chose not to release watchOS 9 for this one particular watch model, which put the device in an awkward state of limbo for <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-stops-selling-watch-series-3-eight-months-after-its-last-security-update\/\">eight months, while Apple still sold it, knowing it was dangerously vulnerable<\/a>.<\/p>\n<p>Apple only patched this week&#8217;s kernel vulnerability (CVE-2023-32434) in this update, however; not a single other CVE was listed as having been addressed. This means that the Apple Watch Series 3 remains vulnerable to dozens of other vulnerabilities\u2014including other actively exploited vulnerabilities\u2014and is still unsafe to use, in spite of this week&#8217;s watchOS 8.8.1 security update.<\/p>\n<p>The &#8220;8.8.1&#8221; version numbering is very odd, considering that there was never a watchOS 8.8 released to the public. Perhaps Apple had intended to release a previous update but never got around to it. In any case, Apple&#8217;s <a href=\"https:\/\/support.apple.com\/en-us\/HT212790\" target=\"_blank\" rel=\"noopener\">About watchOS 8 Updates page<\/a> doesn&#8217;t mention anything about this update besides that it &#8220;provides important security fixes,&#8221; and the <a href=\"https:\/\/support.apple.com\/en-us\/HT213808\">About the security content of watchOS 8.8.1 page<\/a> lists only the one kernel vulnerability that was fixed.<\/p>\n<p>I share more thoughts on this in our separate article, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-gives-watch-series-3-users-false-sense-of-security-patching-1-vulnerability\/\">Apple gives Watch Series 3 users false sense of security, patching 1 vulnerability<\/a>.<a name=\"tv\"><\/a><a name=\"hom\"><\/a><a name=\"display\"><\/a><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"lDb9eZJBjg\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-gives-watch-series-3-users-false-sense-of-security-patching-1-vulnerability\/\">Apple gives Watch Series 3 users false sense of security, patching 1 vulnerability<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Apple gives Watch Series 3 users false sense of security, patching 1 vulnerability&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/apple-gives-watch-series-3-users-false-sense-of-security-patching-1-vulnerability\/embed\/#?secret=lDb9eZJBjg\" data-secret=\"lDb9eZJBjg\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<h3>No tvOS, audioOS, Studio Display updates<\/h3>\n<div>Apple did not release any corresponding updates to address vulnerabilities in tvOS or audioOS (the Apple TV and HomePod operating systems, respectively) or Studio Display Firmware this week. Presumably this either means that these operating systems and devices were unaffected, or perhaps that they may be less likely to be exploited (in which case they could theoretically get patches at a later date).<a name=\"keys\"><\/a><\/div>\n<h3>Key takeaways<\/h3>\n<p>If you get nothing else out of this article, here are some key points:<\/p>\n<ul>\n<li>Apple released urgent security updates this week; <strong>check for and install updates on your Macs, iPhones, iPads, and Apple Watches<\/strong> as soon as possible.<\/li>\n<li>At this point, <strong>macOS Ventura, iOS 16, and iPadOS 16 are the only safe operating systems<\/strong> to use on Macs, iPhones, and iPads, respectively.\n<ul>\n<li>If you have a Mac for which Apple doesn&#8217;t officially support Ventura, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-keep-older-macs-secure-a-geeky-approach\/\">you may be able to upgrade it anyway<\/a>.<\/li>\n<li>If you have an older iPhone or iPad that isn&#8217;t compatible with 16.x, or any iPod touch, buying a new device is the safest option.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>It is advisable to update to the latest operating systems as soon as you reasonably can, especially when Apple either releases a Rapid Security Response or warns that there are &#8220;actively exploited&#8221; vulnerabilities in the wild. It&#8217;s important to get the benefits of new security fixes as quickly as possible to help you stay protected from hackers and malware.<\/p>\n<p>If you have a Mac running macOS Monterey or Big Sur that&#8217;s compatible with Ventura, you may wish to update to the current Monterey or Big Sur version for now, and then as soon as practical, upgrade to macOS Ventura. <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-potentially-make-users-security-and-privacy-precarious\/\">Here&#8217;s why.<\/a> Generally speaking, it is best to upgrade to the latest Apple OS versions quickly for security reasons. For maximum security, one cannot rely on any minimal security patches Apple may release for previous OS versions.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"G62A7X9y9K\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-potentially-make-users-security-and-privacy-precarious\/\">Apple&#8217;s Poor Patching Policies Potentially Make Users&#8217; Security and Privacy Precarious<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Apple&#8217;s Poor Patching Policies Potentially Make Users&#8217; Security and Privacy Precarious&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-potentially-make-users-security-and-privacy-precarious\/embed\/#?secret=G62A7X9y9K\" data-secret=\"G62A7X9y9K\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>Whenever you&#8217;re preparing to update iOS, iPadOS, or macOS, always back up your data before installing any updates. This gives you a restore point if something does not go as planned.<\/p>\n<p>See also our article on <a href=\"https:\/\/www.intego.com\/mac-security-blog\/should-you-back-up-your-ios-device-to-icloud-or-itunes\/\">how to back up your iPhone or iPad to iCloud and to your Mac<\/a>.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"PluZbLdcjn\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/should-you-back-up-your-ios-device-to-icloud-or-itunes\/\">Should you back up your iPhone to iCloud or your Mac? Here&#8217;s how to do both<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Should you back up your iPhone to iCloud or your Mac? Here&#8217;s how to do both&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/should-you-back-up-your-ios-device-to-icloud-or-itunes\/embed\/#?secret=PluZbLdcjn\" data-secret=\"PluZbLdcjn\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>See also our related article on <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-verify-your-backups-are-working-properly\/\">how to check your macOS backups to ensure they work correctly<\/a>.<a name=\"learnmore\"><\/a><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"POg6FhKYhc\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-verify-your-backups-are-working-properly\/\">How to Verify Your Backups are Working Properly<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;How to Verify Your Backups are Working Properly&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-verify-your-backups-are-working-properly\/embed\/#?secret=POg6FhKYhc\" data-secret=\"POg6FhKYhc\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<h3>How can I learn more?<\/h3>\n<p>Last week on <a href=\"https:\/\/www.intego.com\/mac-security-blog\/new-security-and-privacy-features-in-macos-sonoma-ios-17-and-ipados-17-2\/\">episode 296<\/a> of the Intego Mac Podcast, we talked about the implausibility of Apple colluding with the U.S. government to hack a U.S. adversary. This week, we discussed the new Apple patches immediately as they were released, while recording <a href=\"https:\/\/www.intego.com\/mac-security-blog\/jokerspy-passkeys-apple-security-updates-and-new-private-browsing-features-intego-mac-podcast-episode-297\/\">episode 297<\/a>.<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/player.fireside.fm\/v2\/GegHgcrH+Oss52L2a?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, including security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Twitter-logo-icon-64.png\" alt=\"Follow Intego on Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Facebook-logo-icon-64.png\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/YouTube-logo-icon-64.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Pinterest-logo-icon-64.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/LinkedIn-logo-icon-64.png\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Instagram-logo-icon-64.png\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apple patched three zero-day vulnerabilities this week, two of which were used to infect Russian iPhones with TriangleDB malware as part of Operation Triangulation.<\/p>\n","protected":false},"author":14,"featured_media":98367,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[69,4627,4645,1486,3175,4589,4618,4643,86,115,4694,4583,148],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Apple patched three zero-day vulnerabilities this week, two of which were used to infect Russian iPhones with TriangleDB malware as part of Operation Triangulation.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-vulns-used-to-infect-russian-iphones-with-triangledb-malware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple patches vulns used to infect Russian iPhones with TriangleDB malware - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Apple patched three zero-day vulnerabilities this week, two of which were used to infect Russian iPhones with TriangleDB malware as part of Operation Triangulation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-vulns-used-to-infect-russian-iphones-with-triangledb-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-23T20:54:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-27T08:07:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/06\/Apple-software-update-red-critical-urgent-running-from-TriangleDB-malware-400x260-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-vulns-used-to-infect-russian-iphones-with-triangledb-malware\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/06\/Apple-software-update-red-critical-urgent-running-from-TriangleDB-malware-400x260-1.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/06\/Apple-software-update-red-critical-urgent-running-from-TriangleDB-malware-400x260-1.jpg\",\"width\":400,\"height\":260,\"caption\":\"Apple software update red critical urgent running from TriangleDB iOS malware\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-vulns-used-to-infect-russian-iphones-with-triangledb-malware\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-vulns-used-to-infect-russian-iphones-with-triangledb-malware\/\",\"name\":\"Apple patches vulns used to infect Russian iPhones with TriangleDB malware - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-vulns-used-to-infect-russian-iphones-with-triangledb-malware\/#primaryimage\"},\"datePublished\":\"2023-06-23T20:54:20+00:00\",\"dateModified\":\"2023-07-27T08:07:45+00:00\",\"description\":\"Apple patched three zero-day vulnerabilities this week, two of which were used to infect Russian iPhones with TriangleDB malware as part of Operation Triangulation.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-vulns-used-to-infect-russian-iphones-with-triangledb-malware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-vulns-used-to-infect-russian-iphones-with-triangledb-malware\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-vulns-used-to-infect-russian-iphones-with-triangledb-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple patches vulns used to infect Russian iPhones with TriangleDB malware\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-vulns-used-to-infect-russian-iphones-with-triangledb-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-vulns-used-to-infect-russian-iphones-with-triangledb-malware\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Apple patches vulns used to infect Russian iPhones with TriangleDB malware\",\"datePublished\":\"2023-06-23T20:54:20+00:00\",\"dateModified\":\"2023-07-27T08:07:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-vulns-used-to-infect-russian-iphones-with-triangledb-malware\/#webpage\"},\"wordCount\":2447,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-vulns-used-to-infect-russian-iphones-with-triangledb-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/06\/Apple-software-update-red-critical-urgent-running-from-TriangleDB-malware-400x260-1.jpg\",\"keywords\":[\"iOS\",\"iOS 15\",\"iOS 16\",\"iOS Malware\",\"macOS\",\"macOS Big Sur\",\"macOS Monterey\",\"macOS Ventura\",\"Malware\",\"Safari\",\"TriangleDB\",\"watchOS\",\"WebKit\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-vulns-used-to-infect-russian-iphones-with-triangledb-malware\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Apple patched three zero-day vulnerabilities this week, two of which were used to infect Russian iPhones with TriangleDB malware as part of Operation Triangulation.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-vulns-used-to-infect-russian-iphones-with-triangledb-malware\/","og_locale":"en_US","og_type":"article","og_title":"Apple patches vulns used to infect Russian iPhones with TriangleDB malware - The Mac Security Blog","og_description":"Apple patched three zero-day vulnerabilities this week, two of which were used to infect Russian iPhones with TriangleDB malware as part of Operation Triangulation.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-vulns-used-to-infect-russian-iphones-with-triangledb-malware\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2023-06-23T20:54:20+00:00","article_modified_time":"2023-07-27T08:07:45+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/06\/Apple-software-update-red-critical-urgent-running-from-TriangleDB-malware-400x260-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-vulns-used-to-infect-russian-iphones-with-triangledb-malware\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/06\/Apple-software-update-red-critical-urgent-running-from-TriangleDB-malware-400x260-1.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/06\/Apple-software-update-red-critical-urgent-running-from-TriangleDB-malware-400x260-1.jpg","width":400,"height":260,"caption":"Apple software update red critical urgent running from TriangleDB iOS malware"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-vulns-used-to-infect-russian-iphones-with-triangledb-malware\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-vulns-used-to-infect-russian-iphones-with-triangledb-malware\/","name":"Apple patches vulns used to infect Russian iPhones with TriangleDB malware - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-vulns-used-to-infect-russian-iphones-with-triangledb-malware\/#primaryimage"},"datePublished":"2023-06-23T20:54:20+00:00","dateModified":"2023-07-27T08:07:45+00:00","description":"Apple patched three zero-day vulnerabilities this week, two of which were used to infect Russian iPhones with TriangleDB malware as part of Operation Triangulation.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-vulns-used-to-infect-russian-iphones-with-triangledb-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-patches-vulns-used-to-infect-russian-iphones-with-triangledb-malware\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-vulns-used-to-infect-russian-iphones-with-triangledb-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Apple patches vulns used to infect Russian iPhones with TriangleDB malware"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-vulns-used-to-infect-russian-iphones-with-triangledb-malware\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-vulns-used-to-infect-russian-iphones-with-triangledb-malware\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Apple patches vulns used to infect Russian iPhones with TriangleDB malware","datePublished":"2023-06-23T20:54:20+00:00","dateModified":"2023-07-27T08:07:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-vulns-used-to-infect-russian-iphones-with-triangledb-malware\/#webpage"},"wordCount":2447,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-vulns-used-to-infect-russian-iphones-with-triangledb-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/06\/Apple-software-update-red-critical-urgent-running-from-TriangleDB-malware-400x260-1.jpg","keywords":["iOS","iOS 15","iOS 16","iOS Malware","macOS","macOS Big Sur","macOS Monterey","macOS Ventura","Malware","Safari","TriangleDB","watchOS","WebKit"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-patches-vulns-used-to-infect-russian-iphones-with-triangledb-malware\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/06\/Apple-software-update-red-critical-urgent-running-from-TriangleDB-malware-400x260-1.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-pzZ","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/98331"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=98331"}],"version-history":[{"count":9,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/98331\/revisions"}],"predecessor-version":[{"id":98541,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/98331\/revisions\/98541"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/98367"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=98331"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=98331"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=98331"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}