by j4nek on 6/2/23, 12:45 PM with 153 comments
by londons_explore on 6/2/23, 1:42 PM
I would then have another department whose job is to be as subtle as possible - for example, all their exploits are 'in ram' and all data sent back is plausibly deniable. (for example, rather than using a random 256 bit nonce while establishing an HTTPS connection to apple to check for updates, use 256 bits of encrypted data you wish to exfiltrate)
by transpute on 6/2/23, 1:42 PM
> A collection of utilities to simplify and automate the process of gathering forensic traces helpful to identify a potential compromise of Android and iOS devices ... released by the Amnesty International Security Lab in July 2021 in the context of the Pegasus project along with a technical forensic methodology..
STIX IoC format, https://www.oasis-open.org/2021/06/23/stix-v2-1-and-taxii-v2...
> The [threat intelligence] work was based initially on three specifications contributed by the US Department of Homeland Security (DHS) for development and standardization under the OASIS open standards process: STIX (Structured Threat Information Expression), TAXII (Trusted Automated Exchange of Indicator Information), and CybOX (Cyber Observable Expression).
iOS IoC sources, please add to this list:
https://github.com/AmnestyTech/investigations
https://github.com/citizenlab/malware-indicators
https://securelist.com/operation-triangulation/109842/
by buildbuildbuild on 6/2/23, 1:10 PM
https://en.wikipedia.org/wiki/Kaspersky_bans_and_allegations...
by infotogivenm on 6/2/23, 2:51 PM
by dmix on 6/2/23, 1:17 PM
Seems pretty noisy IMO. It prevents software updates with visible errors. I wonder if its just the limitations of iOS or its a non-nation state actor. I noticed it modifies some Facetime files, I wonder if it exploits the camera through that.
by kornhole on 6/2/23, 3:05 PM
by nailer on 6/2/23, 1:34 PM
What is APT in this context?
by m3kw9 on 6/2/23, 3:10 PM
by psychphysic on 6/2/23, 1:11 PM
by slobiwan on 6/2/23, 1:55 PM
by AlbinoDaffy on 6/2/23, 7:45 PM
https://imazing.com/guides/detect-pegasus-and-other-spyware-...
by cynicalsecurity on 6/2/23, 5:11 PM
I would recommend to fork it, thoroughly analyse every line of code and run it on a dedicated computer without internet. Always keep in mind you can't trust them at all.
by avodonosov on 6/2/23, 1:24 PM
https://www-fsb-ru.translate.goog/fsb/press/message/single.h...
by chrisfinazzo on 6/2/23, 2:23 PM
It's debatable how useful this advice is for field agents, who might not be carrying a computer with them all the time, but for regular people it's entirely feasible.