return2ozma@lemmy.world to Technology@lemmy.worldEnglish · 2 years ago4-year campaign backdoored iPhones using possibly the most advanced exploit everarstechnica.comexternal-linkmessage-square13fedilinkarrow-up1185arrow-down12
arrow-up1183arrow-down1external-link4-year campaign backdoored iPhones using possibly the most advanced exploit everarstechnica.comreturn2ozma@lemmy.world to Technology@lemmy.worldEnglish · 2 years agomessage-square13fedilink
minus-squarepsud@lemmy.worldlinkfedilinkEnglisharrow-up6·2 years agoIt isn’t persistent over a reboot, but the tested devices received new corrupted iMessages immediately after reboot
minus-squareGlitzyArmrest@lemmy.worldlinkfedilinkEnglisharrow-up3·edit-22 years agoPersistent in APT isn’t referring to the malware itself, but rather the threat actor. I meant that this seems like a textbook APT actor.
It isn’t persistent over a reboot, but the tested devices received new corrupted iMessages immediately after reboot
Persistent in APT isn’t referring to the malware itself, but rather the threat actor. I meant that this seems like a textbook APT actor.