{
	"id": "4478b4fb-8d44-42ab-bbf5-4274f24f3089",
	"created_at": "2026-04-06T00:07:03.986099Z",
	"updated_at": "2026-04-10T03:25:07.657009Z",
	"deleted_at": null,
	"sha1_hash": "e048e1e3149823eaf65247388ac7d16001c09c0c",
	"title": "Operation Triangulation",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 200748,
	"plain_text": "Operation Triangulation\r\nArchived: 2026-04-05 21:44:24 UTC\r\n1. browse\r\n2. congress\r\n3. 2023\r\n4. event\r\noct0xor, kucher1n and bzvr_\r\nVideo Player\r\n00:00\r\n00:00 | 58:05\r\nNone\r\neng (todo)\r\n2.00x\r\n1.50x\r\n1.25x\r\n1.00x\r\n0.75x\r\nSecurity Playlists: '37c3' videos starting here / audio\r\nImagine discovering a zero-click attack targeting Apple mobile devices of your colleagues and managing to\r\ncapture all the stages of the attack. That’s exactly what happened to us! This led to the fixing of four zero-day\r\nvulnerabilities and discovering of a previously unknown and highly sophisticated spyware that had been around\r\nfor years without anyone noticing. We call it Operation Triangulation. We've been teasing this story for almost six\r\nmonths, while thoroughly analyzing every stage of the attack. Now, for the first time, we're ready to tell you all\r\nabout it. This is the story of the most sophisticated attack chain and spyware ever discovered by Kaspersky.\r\nIn this presentation, we will share:\r\n* How we managed to discover and capture all stages of a zero-click attack on iOS, despite the attackers’ efforts to\r\nhide and protect it,\r\n* a comprehensive analysis of the entire attack chain, which exploited five vulnerabilities, including four zero-https://media.ccc.de/v/37c3-11859-operation_triangulation_what_you_get_when_attack_iphones_of_researchers\r\nPage 1 of 2\n\ndays\r\n* the capabilities of the malware that transforms your phone into the ultimate surveillance tool,\r\n* and the links to previously known malware we were able to find.\r\nDownload\r\nThese files contain multiple languages.\r\nThis Talk was translated into multiple languages. The files available for download contain all languages as\r\nseparate audio-tracks. Most desktop video players allow you to choose between them.\r\nPlease look for \"audio tracks\" in your desktop video player.\r\nSubtitles\r\nAudio\r\nTags\r\nSource: https://media.ccc.de/v/37c3-11859-operation_triangulation_what_you_get_when_attack_iphones_of_researchers\r\nhttps://media.ccc.de/v/37c3-11859-operation_triangulation_what_you_get_when_attack_iphones_of_researchers\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia"
	],
	"references": [
		"https://media.ccc.de/v/37c3-11859-operation_triangulation_what_you_get_when_attack_iphones_of_researchers"
	],
	"report_names": [
		"37c3-11859-operation_triangulation_what_you_get_when_attack_iphones_of_researchers"
	],
	"threat_actors": [
		{
			"id": "ad08bd3d-e65c-4cfd-874a-9944380573fd",
			"created_at": "2023-06-23T02:04:34.517668Z",
			"updated_at": "2026-04-10T02:00:04.842233Z",
			"deleted_at": null,
			"main_name": "Operation Triangulation",
			"aliases": [],
			"source_name": "ETDA:Operation Triangulation",
			"tools": [
				"TriangleDB"
			],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "113b8930-4626-4fa0-9a3a-bcf3ef86f595",
			"created_at": "2024-02-06T02:00:04.14393Z",
			"updated_at": "2026-04-10T02:00:03.578394Z",
			"deleted_at": null,
			"main_name": "Operation Triangulation",
			"aliases": [],
			"source_name": "MISPGALAXY:Operation Triangulation",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		}
	],
	"ts_created_at": 1775434023,
	"ts_updated_at": 1775791507,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/e048e1e3149823eaf65247388ac7d16001c09c0c.pdf",
		"text": "https://archive.orkl.eu/e048e1e3149823eaf65247388ac7d16001c09c0c.txt",
		"img": "https://archive.orkl.eu/e048e1e3149823eaf65247388ac7d16001c09c0c.jpg"
	}
}