[6th Reuters]-US Apple <AAPL.O> is a cyber-attack due to a security flaw in the basic software "iOS" of iPhone, an Islamic minority that the Chinese government regards as a security threat Confirmed that it was the target. However, he explained that the scope of the attack was narrow and the defect was already fixed. He argued that it doesn't track iPhone users in real time, as pointed out by researchers at the Google <OO> group.
Researchers from Google's security team "Project Zero" have previously said that five security flaws have led to "a lasting effort to hack iPhone users in a community for at least two years" Published the results. I did not identify the community.
However, media such as CNN and Tech Crunch reported that they were cyber attacks to monitor the Uighurs. Reuters previously reported that China had hacked an Asian telecom company to monitor Uyghur travelers.
Apple said yesterday that cyberattacks were "targeted to a narrow scope" and were affected by "about 10 websites specializing in content related to the Uyghur community" Explained that this is not a hack to “large” iPhone users as pointed out by their team.
In addition, the defect was corrected in February this year, and it was revealed that it was corrected within 10 days after Google pointed out.
Apple said in a statement that the Uighur-related website was attacked for two months, not the two years Google pointed out. “Google ’s findings, released six months after the release of the iOS patch, are misleading as if they were monitoring the private activities of the entire group in real time. For all iPhone users Has raised concerns that their devices have been hacked, "he stressed.
Google, on the other hand, is a statement that supports its findings and will continue to work with Apple and other companies to discover and fix security flaws.
“The results of the technical survey published by Project Zero are intended to deepen our understanding of security vulnerabilities, which will lead to improved defense strategies,” and “specialize on the technical aspects of these vulnerabilities. We support the written findings. "