INSEAD Day 4 - 728x90

Mashreq Q1 profit rises

Total revenue increased 10% year-on-year.

TECOM profit climbs

High occupancy across assets boosts earnings.

Emirates Stallions Q1 revenue up 11%

The rise helped by strong demand in real estate

ADNOC Distribution 2025 dividend $700m

The company had reported EBITDA of $1.17 bn in 2025.

Empower okays $119.1m H2 2025 dividend

The dividend is equivalent to 43.75% of paid-up capital.

Operation Triangulation: Your iOS device might be at risk

Operation Triangulation grants attackers covert surveillance capabilities on iOS devices.
  • The spyware operates discreetly, leaving no trace of its activities on the infected devices upon reboot
  • TriangleDB, the implant deployed in devices, operates in the device's memory, erasing any evidence of its presence

Dubai, UAE – A highly sophisticated malware, known as Operation Triangulation, has recently been unveiled, revealing the covert surveillance capabilities it granted to attackers. This cyberattack specifically targeted iOS devices through iMessage, employing a spyware implant named TriangleDB. 

Operation Triangulation operates discreetly, leaving no trace of its activities on the infected devices upon reboot.

The malware gained prominence following an extensive six-month investigation by Kaspersky,  a cybersecurity and digital privacy company, which delved into the intricacies of the attackers’ exploitation techniques. 

TriangleDB, the implant deployed in Operation Triangulation, exploited a kernel vulnerability to obtain root privileges on the targeted iOS devices. Once successfully deployed, the implant operated solely in the device’s memory, erasing any evidence of its presence upon reboot. This characteristic posed a significant challenge in detecting and removing the implant from the infected devices.

In the absence of a reboot, TriangleDB automatically uninstalled itself after 30 days, unless the attackers extended the timeframe. Acting as a sophisticated spyware, TriangleDB facilitated extensive data collection and monitoring activities.

Within the implant, a total of 24 commands were identified, each serving a distinct purpose. These commands enabled the attackers to interact with the device’s filesystem, manipulate processes, extract victim credentials from the keychain, monitor geolocation, and perform other functions. Also, during the analysis of TriangleDB, signs suggesting the potential for a similar implant targeting macOS devices were discovered.

The spyware reveals the evolving landscape of targeted attacks, underscoring the need for robust cybersecurity measures to safeguard against such threats.