return2ozma@lemmy.world to Technology@lemmy.worldEnglish · 1 year ago4-year campaign backdoored iPhones using possibly the most advanced exploit everarstechnica.comexternal-linkmessage-square58fedilinkarrow-up1542arrow-down110cross-posted to: privacy@programming.devhackernews@derp.foo
arrow-up1532arrow-down1external-link4-year campaign backdoored iPhones using possibly the most advanced exploit everarstechnica.comreturn2ozma@lemmy.world to Technology@lemmy.worldEnglish · 1 year agomessage-square58fedilinkcross-posted to: privacy@programming.devhackernews@derp.foo
minus-squareGlitzyArmrest@lemmy.worldlinkfedilinkEnglisharrow-up34·1 year agoSeems like the definition of advanced persistent threat.
minus-squarepsud@lemmy.worldlinkfedilinkEnglisharrow-up29arrow-down2·1 year agoIt isn’t persistent over a reboot, but the tested devices received new corrupted iMessages immediately after reboot
minus-squareGlitzyArmrest@lemmy.worldlinkfedilinkEnglisharrow-up26·edit-21 year agoPersistent in APT isn’t referring to the malware itself, but rather the threat actor. I meant that this seems like a textbook APT actor.
minus-squareElias Griffin@lemmy.worldlinkfedilinkEnglisharrow-up2arrow-down3·1 year agoYou know what else was also super sophisticated, chained, and confident enough in it’s APT to not be persistent across reboots? DOUBLEPULSAR.
minus-square██████████@lemmy.worldlinkfedilinkEnglisharrow-up10·1 year agoReminded me restart all my devices
Seems like the definition of advanced persistent threat.
It isn’t persistent over a reboot, but the tested devices received new corrupted iMessages immediately after reboot
Persistent in APT isn’t referring to the malware itself, but rather the threat actor. I meant that this seems like a textbook APT actor.
You know what else was also super sophisticated, chained, and confident enough in it’s APT to not be persistent across reboots? DOUBLEPULSAR.
You sure?
Reminded me restart all my devices