In June 2023  , Kaspersky discovered Operation Triangulation, a sophisticated attack campaign targeting Apple iOS devices through iMessage. This campaign utilized a zero-click exploit and a backdoor called TriangleDB to infiltrate devices undetected.
Operation Triangulation exploited two zero-day vulnerabilities in the iMessage platform, allowing malicious attachments to gain complete control over targeted devices . The TriangleDB backdoor , deployed after exploiting a kernel vulnerability  , accessed data from the iPhone’s Keychain and SQLite databases . It also tracked the device’s location using GSM and GPS .
The implant communicated with a command-and-control server   , receiving instructions and periodically exfiltrating files containing location and microphone-recorded data . The microphone-recording module suspended recording when the device screen was turned on to avoid detection  , while the location-monitoring module used GSM data to triangulate the victim’s location when GPS data was unavailable   .
Despite Kaspersky’s discovery of the TriangleDB implant, the identity of the threat actor behind Operation Triangulation remains unknown. Concerns persist about the malware’s capabilities , and there are indications that macOS may also be a target . This campaign employed sophisticated tactics to conceal the adversary’s activities.
The discovery of the TriangleDB implant sheds light on its various modules, including the ability to record microphone audio, extract iCloud Keychain data     , steal information from SQLite databases      , and estimate the victim’s location     . The impact of Operation Triangulation and the potential targeting of macOS raise concerns about the security of Apple devices. Mitigations and future implications should be considered to prevent similar attacks in the future.