Twitter | Pretraživanje | |
Ian Beer
thanks to , for their joint work on this. This has been a huge effort to pull apart and document almost every byte of a multi-year in-the-wild exploitation campaign, which used 14 different iOS exploits.
Reply Retweet Označi sa "sviđa mi se" More
Ian Beer 30. kol
Odgovor korisniku/ci @i41nbeer
It covers every vulnerability in detail, including root cause analysis, what steps could have been taken to prevent the bugs, and what steps should be taken to ensure they don’t happen again.
Reply Retweet Označi sa "sviđa mi se"
Ian Beer 30. kol
Odgovor korisniku/ci @i41nbeer
We’ll look at how the attackers modify their exploitation techniques over time to defeat new mitigations, and investigate the capabilities of the attacker’s implant to access personal information on the exploited devices.
Reply Retweet Označi sa "sviđa mi se"
Bryan 30. kol
Odgovor korisniku/ci @i41nbeer @_clem1 i 2 ostali
Will you be sharing any of the watering hole sites or *any* IOC's? i don't see any in the extensive blog posts. Thanks
Reply Retweet Označi sa "sviđa mi se"
Paul Brears 30. kol
Odgovor korisniku/ci @bry_campbell @i41nbeer i 3 ostali
Would be very interested in the IP it was contacting. I would like to find out if any of our users where infected. As that must be decommissioned now I can’t see the harm in releasing the IP for people to check logs?
Reply Retweet Označi sa "sviđa mi se"
/ 30. kol
Odgovor korisniku/ci @i41nbeer @_clem1 @5aelo
The exploiter god is back 🔥
Reply Retweet Označi sa "sviđa mi se"
LO7 30. kol
Odgovor korisniku/ci @i41nbeer @_clem1 i 5 ostali
What can these exploits be used for?
Reply Retweet Označi sa "sviđa mi se"
:: jake 30. kol
Odgovor korisniku/ci @i41nbeer @_clem1 i 5 ostali
Highly suggest you skim the docs if it's of interest. Looks like GPS, messaging, photos are included.
Reply Retweet Označi sa "sviđa mi se"
🏳️‍🌈Matt.🏳️‍🌈💙 30. kol
Odgovor korisniku/ci @i41nbeer @_clem1 @5aelo
Wow, very scary yet informative write up. This gives me the chills that any site can do this. Thanks for coming out with these writeups
Reply Retweet Označi sa "sviđa mi se"
ⓚⓐⓛⓛⓘⓝ 30. kol
Odgovor korisniku/ci @i41nbeer @_clem1 i 2 ostali
is a top of the chain that can detect with a high accuracy the waterhole attacks
Reply Retweet Označi sa "sviđa mi se"
Dekeneas 30. kol
Odgovor korisniku/ci @i41nbeer @_clem1 @5aelo
Google TAG uses similar technology. Great work!
Reply Retweet Označi sa "sviđa mi se"