Helthydriver

429 posts

Helthydriver

Helthydriver

@Helthydriver

Katılım Temmuz 2011
581 Takip Edilen724 Takipçiler
Sabitlenmiş Tweet
Helthydriver
Helthydriver@Helthydriver·
Two days ago I had the pleasure of presenting our latest research at iVerify about #NSO #Pegasus BLASTPASS Exploit Chain at #BHASIA in Singapore. (#you-shall-not-pass---analysing-a-nso-ios-spyware-sample-37980" target="_blank" rel="nofollow noopener">blackhat.com/asia-24/briefi…) During the talk I presented how forensic analysis led to the discovery of the sample, the amount of steps
English
3
16
89
29.1K
Helthydriver
Helthydriver@Helthydriver·
@gergely_kalman And I also think it’s not too much to ask from a trillion dollar company to spend 2 weeks of an engineers time to fix 5 year old OSs.^^
English
1
0
1
18
Gergely Kalman
Gergely Kalman@gergely_kalman·
@Helthydriver Sure, I just said they didn't tell people to buy new phones, that's it. I was not following this any closer
English
2
0
0
27
Helthydriver
Helthydriver@Helthydriver·
@gergely_kalman Yes thats correct. But they also tell you iPhones are secure, jailbreaks don’t exists and attacks only happen to a few targeted people. I think it’s just important to read between the lines. And translate ;)
English
1
0
0
18
Helthydriver
Helthydriver@Helthydriver·
@gergely_kalman You are right support is way better, but ignoring these attacks and providing information only after public reporting should be called out. We haven’t seen any backports for 16/17 for DarkSword yet.
English
0
0
0
31
Gergely Kalman
Gergely Kalman@gergely_kalman·
@Helthydriver Yeah, but smashing Apple for that is a tad unfair as the last supported device is iPhone 11 which is 7 years old now. That is significantly better than most androids for example. I'm also not an Apple fanboy, but this level of misinfo I could not tolerate
English
2
0
0
44
Helthydriver
Helthydriver@Helthydriver·
@gergely_kalman But I would have to check if any devices last OS is actually 13-14 or if all could update to 15
English
0
0
1
24
Helthydriver retweetledi
@epicenter_works@chaos.social
@[email protected]@epicenter_works·
Erst "nur" für staatliche Spionage eingesetzt – jetzt in kriminellen Händen. Eine mächtige iPhone-Spyware zeigt gerade, wie das läuft. Wir warnen seit Jahren beim #Bundestrojaner. Sicherheitslücken haben keine Exklusivität. Sie stehen ALLEN offen. derstandard.at/story/30000003…
Deutsch
4
54
96
2.9K
Helthydriver
Helthydriver@Helthydriver·
@ryanaraine ^— this is a first! Including specifically naming the Coruna exploits in a security release, Apple just did two things they never did before. But we are still lacking backports for the vulnerabilities seen in DarkSword.
English
0
0
0
771
Huy Nguyen
Huy Nguyen@Little_34306·
How crazy Darksword and GHOSTBLADE are! shout out to @zeroxjf for the finding Unrelated: GHOSTBLADE also my fav comic from WLOP!
Huy Nguyen tweet mediaHuy Nguyen tweet media
English
3
12
160
27.8K
Helthydriver retweetledi
Ryan Naraine
Ryan Naraine@ryanaraine·
Two full iOS exploit kits in one month, deployed via watering holes on public websites, potentially affecting hundreds of millions of devices. Will Apple acknowledge that this no longer fits the "very small number of highly targeted individuals" narrative?
Ryan Naraine tweet media
English
15
139
715
109.2K
Helthydriver retweetledi
Mateusz Krzywicki
Mateusz Krzywicki@krzywix·
In collaboration with Lookout and Google (thank you 🙏) we have been working on tearing down and building detections for DarkSword - iOS exploit chain for iOS 18.4 - 18.7. Super excited for this research 🎉. Please update your iPhones. iverify.io/blog/darksword…
English
15
82
336
76.4K
Helthydriver
Helthydriver@Helthydriver·
@FCE365 A full jailbreak might be unlikely. It missed SPTM, PPL, PAC, … bypasses in Kernel.
English
0
0
1
673
GeoSn0w
GeoSn0w@FCE365·
⚠️New iOS 18 DarkSword Exploit targets iPhone users through Spyware Infected Websites 📲 READ MORE: idevicecentral.com/apple/new-ios-… It looks like a Coruna-related DarkSword exploit has been identified. This can be useful for a Safari-based jailbreak on iOS, but it's also a major security risk since it spreads via infected web pages! Read more in the article.
English
4
11
74
10K
Helthydriver retweetledi
Helthydriver retweetledi
WIRED
WIRED@WIRED·
A powerful iPhone-hacking technique known as DarkSword has been discovered in use by Russian hackers. It can take over devices running iOS 18 that simply visit infected websites. wired.com/story/hundreds…
English
13
191
338
30.6K
Helthydriver
Helthydriver@Helthydriver·
@EvanKlein338226 @ihackbanme There’s plenty of things you can do when caught. But getting there is the hard part. And yeah visibility, but also the “threat module” is something that needs to be vastly improved.
English
0
0
0
61
Evan Klein
Evan Klein@EvanKlein338226·
@ihackbanme 11/10 confidence. And honestly? They're right to not care The sandbox is so locked down that even when caught, there's no forensics possible. It's "we know you did it but can't prove how" energy Modern mobile malware OPSEC: don't bother 🤷
English
1
0
2
692
Zuk
Zuk@ihackbanme·
How much iOS attackers don’t give a F about getting caught from 0 to 10 ? They name their JS files “rce_worker_18.6.js” and rce_module.js. RCE stands for Remote Code Execution. (1/2)
Zuk tweet media
English
3
16
129
12.9K