#GoogleVRP, #iVerify & #Lookout on Wednesday jointly revealed their discovery of a sophisticated iPhone hacking technique, they named #DarkSword, that use #WateringHoleAttack to hack into iOS devices the moment user visit an infected website.
#GoogleVRP, #iVerify & #Lookout on Wednesday jointly revealed their discovery of a sophisticated iPhone hacking technique, they named #DarkSword, that use #WateringHoleAttack to hack into iOS devices the moment user visit an infected website.
NowSecure + iVerify 🤝
Security teams can now see #mobileapp risk directly inside #iVerify Enterprise—from malicious #apps to risky SDK supply-chains.
More visibility. Faster action.
Learn more: https://loom.ly/aalDN3w
Nochmal ein kleines Blogupdate
Polls. Group typing indicators and all other new crap for iMessage is just increased attack surface.
If I didn't know better I would assume they keep adding these to make sure there will always be remote iOS exploits.
I mean after their track record, you would have assumed they figured things out but last year they added the contact photo sharing, and lo and behold, it's apparently being exploited https://iverify.io/blog/iverify-uncovers-evidence-of-zero-click-mobile-exploitation-in-the-us
In May 2024, #iVerify released a $1 app for people to scan their phones for any signs of compromise.
In December 2024, iVerify released a report suggesting out of ~ 3,000 users, there were > detections of #Pegasus infection than previously expected.
🔗 https://iverify.io/blog/how-democratizing-threat-hunting-is-changing-mobile-security
"The company’s Mobile Threat Hunting feature uses a combination of malware signature-based detection, heuristics, and machine learning to look for anomalies in iOS and Android device activity or telltale signs of spyware infection. For paying iVerify customers, the tool regularly checks devices for potential compromise. But the company also offers a free version of the feature for anyone who downloads the iVerify Basics app for $1. These users can walk through steps to generate and send a special diagnostic utility file to iVerify and receive analysis within hours. Free users can use the tool once a month. iVerify's infrastructure is built to be privacy-preserving, but to run the Mobile Threat Hunting feature, users must enter an email address so the company has a way to contact them if a scan turns up spyware—as it did in the seven recent Pegasus discoveries."
https://arstechnica.com/security/2024/12/1-phone-scanner-finds-seven-pegasus-spyware-infections/