TriangleDB

Description

(Kaspersky) The implant, which we dubbed TriangleDB, is deployed after the attackers obtain root privileges on the target iOS device by exploiting a kernel vulnerability. It is deployed in memory, meaning that all traces of the implant are lost when the device gets rebooted. Therefore, if the victim reboots their device, the attackers have to reinfect it by sending an iMessage with a malicious attachment, thus launching the whole exploitation chain again. In case no reboot occurs, the implant uninstalls itself after 30 days, unless this period is extended by the attackers.

Names

Name
TriangleDB

Category

Malware

Type

  • Backdoor
  • Info stealer
  • Exfiltration

Information

Mitre Attack

Malpedia

Other Information

Uuid

5f84e19d-bf8d-44a9-92d5-f95c00d67b46

Last Card Change

2025-06-28