Reign Spyware is being used to hack iPhones

0
51

[ad_1]

It’s no secret that people and experts have always regarded iOS as the safer operating system, thanks in part due to Apple’s stringent control and safety measures. However, a new report from Citizen Labs suggests otherwise, as new spyware called Reign has been infecting iPhones using invisible iCloud calendar invitations and transmitting data without user knowledge.

Developed by an Israeli company called QuaDream, the Reign spyware exploits a vulnerability known as “Endofdays” to attack iPhones running iOS 14.4 and iOS 14.4.2.

Once infected, Reign can access various components of iOS and iPhone functions, similar to the notorious Pegasus spyware. It can record calls and microphone input, take pictures with the camera, extract or remove content from the keychain, generate iCloud 2FA passwords, search files and databases on the device, track the device’s location, and clean software traces to minimize detection possibilities. Therefore, essentially taking over the device and monitoring everything a user does.

How to stay protected?

While Citizen Labs reports that they did not detect any instances of individuals being targeted with the spyware outside the time frame of January 2021 to November 2021, which may suggest that Apple has fixed the vulnerability, users should still take necessary precautions to protect themselves from falling victim.

These include keeping devices updated with the latest security patches, avoiding downloading apps from unknown sources, and being cautious of suspicious emails, messages, or phone calls that may contain phishing links or malicious attachments. Additionally, using anti-virus software can provide an extra layer of protection against spyware attacks.

Moreover, it is also crucial to be aware of the signs of a spyware attack, such as high data usage for an app, slow device performance, and excessive battery drain. If any of the apps installed on your device show these signs, uninstall it immediately and run a malware scan.

[ad_2]

Source link