If you can't say the sites, type of sites, distribution method, type of compromise (of the site), etc... Do you know, or can you say, how long the sites were used as watering holes? And how you know it was only this collection?
-
-
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
Nice write-up! Is there any way to verify if a device was compromised by this? Or would subsequent iOS updates detect/clean up the implant?
-
I read that this malware was removed when you rebooted your phone
- Još 2 druga odgovora
Novi razgovor -
-
-
Looks like some state actor spent big dollars on iOS 0days and asked an intern to write implant and C2


Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.