@[email protected] to [email protected]English • 1 year ago4-year campaign backdoored iPhones using possibly the most advanced exploit everarstechnica.comexternal-linkmessage-square59fedilinkarrow-up1539arrow-down110
arrow-up1529arrow-down1external-link4-year campaign backdoored iPhones using possibly the most advanced exploit everarstechnica.com@[email protected] to [email protected]English • 1 year agomessage-square59fedilink
minus-square@[email protected]linkfedilinkEnglish27•1 year agoIt isn’t persistent over a reboot, but the tested devices received new corrupted iMessages immediately after reboot
minus-square@[email protected]linkfedilinkEnglish25•edit-21 year agoPersistent in APT isn’t referring to the malware itself, but rather the threat actor. I meant that this seems like a textbook APT actor.
minus-squareElias GriffinlinkfedilinkEnglish-1•1 year agoYou know what else was also super sophisticated, chained, and confident enough in it’s APT to not be persistent across reboots? DOUBLEPULSAR.
It isn’t persistent over a reboot, but the tested devices received new corrupted iMessages immediately after reboot
Persistent in APT isn’t referring to the malware itself, but rather the threat actor. I meant that this seems like a textbook APT actor.
You know what else was also super sophisticated, chained, and confident enough in it’s APT to not be persistent across reboots? DOUBLEPULSAR.
You sure?