Movatterモバイル変換


[0]ホーム

URL:


Don’t Run Another Phish Test Until You Read This
CyberHoot
Get StartedBook a Demo
Login

Exploit Chain

10th January 2020 |CybraryExploit Chain


AnExploit Chain is anattack that involves multipleexploits or attacks that are chained together to fully compromise a device. In these attacks, Hackers cannot use a single exploit to compromise their target but instead can combine a series of exploits that ultimately lead to malware getting installed on a smartphone (iOS or Android) which can lead to the loss of critical and sensitive data.  In the cases described in the video below, the websites visited by unsuspecting users contain a variety of attacks which when chained together can compromise the smart phones targeted.

How do I protect myself?

There are a few strategies you can employ to protect yourself from these chained exploits including:

  1. Patch your iOS/Android device to the latest version of vendor OS for the best chance of protection based upon Apple and Android fixing these things without publicly disclosing them to the public.
  2. Reboot your phone.  These exploit chains in their current incarnation was only valid while the device was live after visiting the malicious website.  Rebooting the device reverted to a pristine OS.

Related Terms:Attack,Exploit,Hacker

Source:Chained Exploits, Andrew Whitaker

Additional Reading:

A very Deep Dive into Exploit Chaining (Google’s Project Zero)

yCombinator Exploit Chaining Article

A Deep Dive into iPhone Exploit Chaining (a 40 min. video)

Latest Blogs

Stay sharp with the latestsecurity insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Microsoft Integrates Passkeys into Windows: is this the start of a Passwordless Future?
11th November 2025 |Blog

Microsoft Integrates Passkeys into Windows: is this the start of a Passwordless Future?

Let’s be honest, who hasn’t reset a password at least once this month? For decades, passwords have been our...

Read more
When You Become the Hacker: How Modern Attacks Trick You Into Hacking Yourself
4th November 2025 |Blog

When You Become the Hacker: How Modern Attacks Trick You Into Hacking Yourself

In a shift away from the usual “hack-meets-victim” narrative, a new kind of cyber-assault is emerging. One...

Read more
Domain Takedowns: How to Remove Fraudulent and Typo-squatted Domains and Websites
28th October 2025 |Blog

Domain Takedowns: How to Remove Fraudulent and Typo-squatted Domains and Websites

In cybersecurity, not all attacks happen through fancy malware or zero-day exploits. Some of the most effective...

Read more
Get StartedAll Posts
Get Started

Ready to soar abovesecurity threats?

Get sharper eyes on human risks, with the positive approach that beats traditional phish testing.

Get StartedBook a Demo

[8]ページ先頭

©2009-2025 Movatter.jp