4-year campaign backdoored iPhones using possibly the most advanced exploit ever

return2ozma@lemmy.world to Technology@lemmy.world – 526 points –
4-year campaign backdoored iPhones using possibly the most advanced exploit ever
arstechnica.com
56

You are viewing a single comment

It isn't persistent over a reboot, but the tested devices received new corrupted iMessages immediately after reboot

Persistent in APT isn't referring to the malware itself, but rather the threat actor. I meant that this seems like a textbook APT actor.

You know what else was also super sophisticated, chained, and confident enough in it's APT to not be persistent across reboots? DOUBLEPULSAR.