Get a Pentest and security assessment of your IT network.

News

Implant Teardown

The implant is running in the background as root on an iPhone 8 running iOS 12.0. The implant has access to all the database files (on the victims phone) used by popular end-to-end encryption apps like Whatsapp, Telegram and iMessage. It uploads the device’s keychain, which contains a huge number of credentials and certificates used on and by the device. It can also upload the user’s location in real time, up to once per minute, if the device is online.”]

Source: https://googleprojectzero.blogspot.com/2019/08/implant-teardown.html

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

RasGas, The Second Victim!

News

Technical analysis of the Locker virus on mobile phones