Twitter | Pretraživanje | |
Ian Beer 30. kol
thanks to , for their joint work on this. This has been a huge effort to pull apart and document almost every byte of a multi-year in-the-wild exploitation campaign, which used 14 different iOS exploits.
Reply Retweet Označi sa "sviđa mi se"
Ian Beer 30. kol
Odgovor korisniku/ci @i41nbeer
It covers every vulnerability in detail, including root cause analysis, what steps could have been taken to prevent the bugs, and what steps should be taken to ensure they don’t happen again.
Reply Retweet Označi sa "sviđa mi se"
Ian Beer
We’ll look at how the attackers modify their exploitation techniques over time to defeat new mitigations, and investigate the capabilities of the attacker’s implant to access personal information on the exploited devices.
Reply Retweet Označi sa "sviđa mi se" More
Dan Guido 30. kol
Odgovor korisniku/ci @i41nbeer
This is really incredible work! Is there a reason you published without identifying the network infrastructure associated with these attacks? Everyone I know is dying to search their web logs right about now.
Reply Retweet Označi sa "sviđa mi se"
Frank Bajak 30. kol
Odgovor korisniku/ci @i41nbeer
Please follow for DM. I have questions about why you are not naming the targeted population.
Reply Retweet Označi sa "sviđa mi se"
Frank Bajak 30. kol
Odgovor korisniku/ci @i41nbeer
My DMs are open for anyone who can provide detail on the exploited websites and targeted population.
Reply Retweet Označi sa "sviđa mi se"
Miles Veteranus 30. kol
Odgovor korisniku/ci @i41nbeer @k8em0
But the vulnerabilities didnt change.
Reply Retweet Označi sa "sviđa mi se"
Roberto Pezzali 30. kol
Odgovor korisniku/ci @i41nbeer
Very interesting. But as a journalist I have two question: - why now, in perfect time with new iphone launch invitation - why no words on the website that use these tecnique? Geo distribution, one sample, etc?
Reply Retweet Označi sa "sviđa mi se"
Drago Indjic ака Инђић 30. kol
Odgovor korisniku/ci @i41nbeer
A few lessons for and
Reply Retweet Označi sa "sviđa mi se"
mitp0sh ( みとぽしゅ ) 30. kol
Odgovor korisniku/ci @i41nbeer
Admitting that I have yet fully read, did you get any info in terms of attribution you can disclose? ;)
Reply Retweet Označi sa "sviđa mi se"
Radu Manolescu 31. kol
Odgovor korisniku/ci @i41nbeer @Google
Great work, but one glaring omission: which websites were infected? Since neither you nor are disclosing these details, one is lead to speculate that that the infected website list would lead suspicions to a state actor in a major market => headaches for Google. Disclose!
Reply Retweet Označi sa "sviđa mi se"
Robert7🏴󠁧󠁢󠁥󠁮󠁧󠁿🏴󠁧󠁢󠁳󠁣󠁴󠁿🇩🇰🇺🇸 31. kol
Odgovor korisniku/ci @i41nbeer @Google
Is it coincidence that (Ian Beer) released an article about iPhones being hacked just days after many news outlets reported Google yanked yet another app from its store b/c it had infected millions of androids with malware? Nope. 1/2
Reply Retweet Označi sa "sviđa mi se"
Robert7🏴󠁧󠁢󠁥󠁮󠁧󠁿🏴󠁧󠁢󠁳󠁣󠁴󠁿🇩🇰🇺🇸 31. kol
Odgovor korisniku/ci @i41nbeer @Google
Is it coincidence that I receive about 2-3 surveys per year on YouGov asking many detailed questions regarding Google Android malware and iPhone security (including questions about news stories)? Nope. Your paranoia is showing Google. How much did they pay you, Ian?
Reply Retweet Označi sa "sviđa mi se"