return2ozma@lemmy.world to Technology@lemmy.worldEnglish · 1 year ago4-year campaign backdoored iPhones using possibly the most advanced exploit everarstechnica.comexternal-linkmessage-square57linkfedilinkarrow-up1543arrow-down110cross-posted to: privacy[email protected]
arrow-up1533arrow-down1external-link4-year campaign backdoored iPhones using possibly the most advanced exploit everarstechnica.comreturn2ozma@lemmy.world to Technology@lemmy.worldEnglish · 1 year agomessage-square57linkfedilinkcross-posted to: privacy[email protected]
minus-squarepsud@lemmy.worldlinkfedilinkEnglisharrow-up29arrow-down2·1 year agoIt isn’t persistent over a reboot, but the tested devices received new corrupted iMessages immediately after reboot
minus-squareGlitzyArmrest@lemmy.worldlinkfedilinkEnglisharrow-up26·edit-21 year agoPersistent in APT isn’t referring to the malware itself, but rather the threat actor. I meant that this seems like a textbook APT actor.
minus-squareElias Griffin@lemmy.worldlinkfedilinkEnglisharrow-up2arrow-down3·1 year agoYou know what else was also super sophisticated, chained, and confident enough in it’s APT to not be persistent across reboots? DOUBLEPULSAR.
minus-squarecorsicanguppy@lemmy.caBannedlinkfedilinkEnglisharrow-up4arrow-down5·edit-28 months agoRemoved by mod
It isn’t persistent over a reboot, but the tested devices received new corrupted iMessages immediately after reboot
Persistent in APT isn’t referring to the malware itself, but rather the threat actor. I meant that this seems like a textbook APT actor.
You know what else was also super sophisticated, chained, and confident enough in it’s APT to not be persistent across reboots? DOUBLEPULSAR.
Removed by mod