Nov 15 (V7N) — Netherlands-based cybersecurity firm ThreatFabric has uncovered a new variant of the spyware "LightSpy," designed to target iPhones. The spyware is capable of stealing sensitive data and even rendering devices inoperable, according to a report by The Hacker News.

Capabilities of LightSpy :
LightSpy is significantly more advanced than its earlier versions. Once installed on an iPhone, it can:
- Collect detailed device information such as phone numbers, call history, Wi-Fi network details, and iCloud data.
- Access location, screenshots, sound recordings, photos, and browsing history.
- Extract sensitive data from messaging apps like Telegram, WhatsApp, and WeChat.
- Delete messages or phone numbers from the device.

 
The spyware infiltrates iPhones through a WebKit exploit, typically delivered via malicious websites. Users unknowingly activate the spyware by visiting these sites, where a disguised file with a ".PNG" extension initiates the infection.

Key components include:
1. FrameworkLoader : Downloads the spyware's core module and plugins.
2. Malicious Modules : Create hidden folders to store stolen data.
3. Data Transmission : Sends the collected information to cybercriminals.

Staying Safe from LightSpy :
ThreatFabric has recommended the following precautions for iPhone users:
1. Update iOS : Ensure your device runs the latest version of iOS, as updates often include critical security patches.
2. Avoid Suspicious Links : Do not click on unknown or suspicious links and websites.
3. Use Trusted Sources : Only download apps and files from reputable sources.

Cybersecurity experts emphasize the importance of vigilance in an era where mobile threats are increasingly sophisticated. For additional protection, users may consider using cybersecurity apps and enabling advanced device security features.

For those concerned about potential infections, seeking assistance from a trusted cybersecurity professional is advised.

END/RH/AJ