@return2ozma to TechnologyEnglish • 9 months ago4-year campaign backdoored iPhones using possibly the most advanced exploit everarstechnica.comexternal-linkmessage-square59arrow-up1545arrow-down110cross-posted to: [email protected][email protected][email protected]
arrow-up1535arrow-down1external-link4-year campaign backdoored iPhones using possibly the most advanced exploit everarstechnica.com@return2ozma to TechnologyEnglish • 9 months agomessage-square59cross-posted to: [email protected][email protected][email protected]
minus-square@psudlinkEnglish28•9 months agoIt isn’t persistent over a reboot, but the tested devices received new corrupted iMessages immediately after reboot
minus-square@GlitzyArmrestlinkEnglish27•edit-29 months agoPersistent in APT isn’t referring to the malware itself, but rather the threat actor. I meant that this seems like a textbook APT actor.
minus-squareElias GriffinlinkEnglish-1•9 months agoYou know what else was also super sophisticated, chained, and confident enough in it’s APT to not be persistent across reboots? DOUBLEPULSAR.
It isn’t persistent over a reboot, but the tested devices received new corrupted iMessages immediately after reboot
Persistent in APT isn’t referring to the malware itself, but rather the threat actor. I meant that this seems like a textbook APT actor.
You know what else was also super sophisticated, chained, and confident enough in it’s APT to not be persistent across reboots? DOUBLEPULSAR.
You sure?