April 28, 2024

TechNewsInsight

Technology/Tech News – Get all the latest news on Technology, Gadgets with reviews, prices, features, highlights and specificatio

IP Group reveals a Trojan targeting iOS users – iPhone Islam

IP Group reveals a Trojan targeting iOS users – iPhone Islam

Information thieves continue to fight Apple's security vulnerabilities! In a new incident, Group IP has revealed a new Trojan called “Gold Digger” that aims to steal iOS users’ data and bank accounts. Not only that, IP Group hackers use artificial intelligence to create new images of victims to facilitate the process of hacking and seizing bank accounts. Follow this article and God will be pleased to share all the details with you.

From iPhoneIslam.com, image of a person holding a magnifying glass and icons, exploring the world of Gold Digger.

What is a gold digger Trojan?

Simply put, it is a Trojan or advanced hacking software that infects Android and iOS devices. It was designed by Chinese hackers and aims to hijack bank accounts by stealing facial biometric data, phone messages and identity documents.

From iPhoneIslam.com, a golden statue of a horse on a blue background, Gold Digger.


Does Gold Digger target iOS users' data?

Initially, Gold Digger was a program designed to hack the Android operating system, but it was developed to attack iOS. It also collects all the data related to facial recognition, SMS and identity documents, which makes it a scary risk for iPhone or iPad users.

This data is used to create a fake image of the victim with the help of artificial intelligence. It then uses these photos and videos to access your bank account. Over time, the victim realizes that his account has been hacked.

So far, the intellectual property firm has confirmed that the Trojan is targeting Apple users in Vietnam and Thailand. However, since this vulnerability is still under development, it is inevitable that these thefts will occur in other parts of the world.

From iPhoneIslam.com, A man holds a phone emitting a magical golden light.


How did the Trojan horse get to the iPhone?

Initially, this Trojan was distributed through the Test Flight platform. This is because Apple allows developers to publish beta versions of their apps on the platform without review on the App Store. In addition, hackers rely on access to mobile device management (MDM) profiles.

See also  Benchmark results for the top model Intel Core Ultra 9 185H CPU for 14th Gen laptops leaked - GIGAZINE

Therefore, the hacker's role revolves around convincing the victim to install an application on the phone from outside the application store. By then, users will be able to access and use most of the information on the phone.

From iPhoneIslam.com, A person holds a phone with a golden phoenix, displaying the elegant gold design.


What will Apple do to eliminate Gold Digger?

Experts have previously indicated that newer versions of the iOS operating system are vulnerable to hacking. This issue was reported by the IP Group and is currently being fixed by Apple. As a user, you should avoid installing unofficial sources or applications under development.

From iPhoneIslam.com, a smartphone application that displays the Trojan on the screen.


Do you think Apple will be able to solve the problem soon? Tell us about it in the comments.

Infinitive:

9to5mac

Related articles