An Exploit Chain is an attack that involves multiple exploits or attacks that are chained together to fully compromise a device. In these attacks, Hackers cannot use a single exploit to compromise their target but instead can combine a series of exploits that ultimately lead to malware getting installed on a smartphone (iOS or Android) which can lead to the loss of critical and sensitive data. In the cases described in the video below, the websites visited by unsuspecting users contain a variety of attacks which when chained together can compromise the smart phones targeted.
There are a few strategies you can employ to protect yourself from these chained exploits including:
Related Terms: Attack, Exploit, Hacker
Source: Chained Exploits, Andrew Whitaker
Additional Reading:
A very Deep Dive into Exploit Chaining (Google’s Project Zero)
yCombinator Exploit Chaining Article
Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.
Active Attacks on Messaging Apps The Cybersecurity and Infrastructure Security Agency (CISA) recently issued...
Read more
The world of work has changed enormously since COVID-19. Gone are the days when IT admins sat behind a corporate...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.
