4-year campaign backdoored iPhones using possibly the most advanced exploit everreturn2ozma@lemmy.world to Technology@lemmy.world – 526 points – 11 months agoarstechnica.com56Post a CommentPreviewYou are viewing a single commentView all commentsShow the parent commentIt isn't persistent over a reboot, but the tested devices received new corrupted iMessages immediately after rebootPersistent in APT isn't referring to the malware itself, but rather the threat actor. I meant that this seems like a textbook APT actor.You know what else was also super sophisticated, chained, and confident enough in it's APT to not be persistent across reboots? DOUBLEPULSAR. it’s You sure?
It isn't persistent over a reboot, but the tested devices received new corrupted iMessages immediately after rebootPersistent in APT isn't referring to the malware itself, but rather the threat actor. I meant that this seems like a textbook APT actor.You know what else was also super sophisticated, chained, and confident enough in it's APT to not be persistent across reboots? DOUBLEPULSAR. it’s You sure?
Persistent in APT isn't referring to the malware itself, but rather the threat actor. I meant that this seems like a textbook APT actor.You know what else was also super sophisticated, chained, and confident enough in it's APT to not be persistent across reboots? DOUBLEPULSAR. it’s You sure?
You know what else was also super sophisticated, chained, and confident enough in it's APT to not be persistent across reboots? DOUBLEPULSAR. it’s You sure?
It isn't persistent over a reboot, but the tested devices received new corrupted iMessages immediately after reboot
Persistent in APT isn't referring to the malware itself, but rather the threat actor. I meant that this seems like a textbook APT actor.
You know what else was also super sophisticated, chained, and confident enough in it's APT to not be persistent across reboots? DOUBLEPULSAR.
You sure?