AnExploit Chain is anattack that involves multipleexploits or attacks that are chained together to fully compromise a device. In these attacks, Hackers cannot use a single exploit to compromise their target but instead can combine a series of exploits that ultimately lead to malware getting installed on a smartphone (iOS or Android) which can lead to the loss of critical and sensitive data. In the cases described in the video below, the websites visited by unsuspecting users contain a variety of attacks which when chained together can compromise the smart phones targeted.
There are a few strategies you can employ to protect yourself from these chained exploits including:
Related Terms:Attack,Exploit,Hacker
Source:Chained Exploits, Andrew Whitaker
Additional Reading:
A very Deep Dive into Exploit Chaining (Google’s Project Zero)
yCombinator Exploit Chaining Article
Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Let’s be honest, who hasn’t reset a password at least once this month? For decades, passwords have been our...
Read more
In a shift away from the usual “hack-meets-victim” narrative, a new kind of cyber-assault is emerging. One...
Read more
In cybersecurity, not all attacks happen through fancy malware or zero-day exploits. Some of the most effective...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.
