NSO used shared infrastructure to launch the attack, some of which had other domains with WHOIS info that revealed them as true owners.
-
-
Replying to @dguido
“We’re a complete ghost” -NSO co-founder Omri Lavie Except for domains w/ real WHOIS, sending SMS, and strings in malware, sure.
1 reply 23 retweets 40 likes -
Replying to @dguido
Apple has a unique capability to respond to these issues. They can patch and users apply it. Discovery means the technique dies immediately.
3 replies 7 retweets 10 likes -
Replying to @dguido
Scary thought: If this works via clicking a link, it also works when injected into a browser session. Use a VPN! https://github.com/trailofbits/algo …
3 replies 10 retweets 17 likes -
Replying to @dguido
Reports from Citizen Lab and Lookout are both out now: Citizen Lab: https://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/ … Lookout: https://info.lookout.com/rs/051-ESQ-475/images/lookout-pegasus-technical-analysis.pdf …
1 reply 28 retweets 35 likes -
Replying to @dguido
As usual, neither report contains *any* detailed analysis of the exploits, only the malware payload. The skills to do so are too uncommon.
2 replies 11 retweets 8 likes -
Replying to @dguido
"This vulnerability is complex" betrays a huge amount of information about the state of exploit knowledge in public.pic.twitter.com/Bo6NUYNw0p
1 reply 21 retweets 17 likes -
Replying to @dguido
Dan Guido Retweeted
lol don't try this at home kids https://twitter.com/ncweaver/status/768863660550729728 …
Dan Guido added,
This Tweet is unavailable.1 reply 1 retweet 3 likes -
Replying to @dguido
Important to note: The NSO exploit chain DID NOT include a sandbox escape. This means their kernel exploits were good enough w/o one.
5 replies 38 retweets 34 likes -
Replying to @dguido
The lack of exploit analysis skill has consequences. No IOCs for pre-compromise detections. You have to wait until you get 0wned to find it.
2 replies 21 retweets 13 likes
People wondering why I'm not surprised: Amateurs produce iOS jailbreaks once a year (Pangu et al). Professionals won't be any less skilled.
-
-
Replying to @dguido
People asking abt iOS10: Unlikely that existing toolkit works out of the box on 10. Even if underlying vulns still present, kit prob broken.
4 replies 5 retweets 6 likes -
Replying to @dguido
Absolutely true. 9.3.5 protects you from NSO customers, and expected copycat attacks once exploits become public. iOS10 more meaningful.
2 replies 1 retweet 3 likes - 5 more replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.