return2ozma@lemmy.world to Technology@lemmy.worldEnglish · 9 个月前4-year campaign backdoored iPhones using possibly the most advanced exploit everarstechnica.comexternal-linkmessage-square55fedilinkarrow-up1518arrow-down110cross-posted to: todayilearned@lemmit.onlinehackernews@lemmy.smeargle.fanshackernews@derp.foo
arrow-up1508arrow-down1external-link4-year campaign backdoored iPhones using possibly the most advanced exploit everarstechnica.comreturn2ozma@lemmy.world to Technology@lemmy.worldEnglish · 9 个月前message-square55fedilinkcross-posted to: todayilearned@lemmit.onlinehackernews@lemmy.smeargle.fanshackernews@derp.foo
minus-squareGlitzyArmrest@lemmy.worldlinkfedilinkEnglisharrow-up25·edit-29 个月前Persistent in APT isn’t referring to the malware itself, but rather the threat actor. I meant that this seems like a textbook APT actor.
minus-squareElias Griffin@lemmy.worldlinkfedilinkEnglisharrow-up2arrow-down3·9 个月前You know what else was also super sophisticated, chained, and confident enough in it’s APT to not be persistent across reboots? DOUBLEPULSAR.
Persistent in APT isn’t referring to the malware itself, but rather the threat actor. I meant that this seems like a textbook APT actor.
You know what else was also super sophisticated, chained, and confident enough in it’s APT to not be persistent across reboots? DOUBLEPULSAR.
You sure?