An Exploit Chain is an attack that involves multiple exploits or attacks that are chained together to fully compromise a device. In these attacks, Hackers cannot use a single exploit to compromise their target but instead can combine a series of exploits that ultimately lead to malware getting installed on a smartphone (iOS or Android) which can lead to the loss of critical and sensitive data. In the cases described in the video below, the websites visited by unsuspecting users contain a variety of attacks which when chained together can compromise the smart phones targeted.
There are a few strategies you can employ to protect yourself from these chained exploits including:
Related Terms: Attack, Exploit, Hacker
Source: Chained Exploits, Andrew Whitaker
Additional Reading:
A very Deep Dive into Exploit Chaining (Google’s Project Zero)
yCombinator Exploit Chaining Article
Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.
A Practical Brief for vCISOs THE WARNING WE IGNORED OR COULD NOT UNDERSTAND For years, the most credible...
Read more
A guide to spotting senior executive impersonation scams before the fake CEO gets a real wire transfer. It...
Read more
Artificial Intelligence (or AI) is making phishing emails smarter, malware sneakier, and credential theft easier...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.
