TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Operation Triangulation What You Get When Attack iPhones of Researchers [video]

27 pointsby ashurovover 1 year ago

2 comments

rollulusover 1 year ago
See also: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=38783112">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=38783112</a>
评论 #38860060 未加载
rusty_ventureover 1 year ago
The lack of attribution on this organized and well-financed operation is the most concerning part of this attack, in my opinion. It seems unlikely that any APT would burn ALL of its 0-days for the iOS platform in one campaign, so they likely have more which they can pivot to. Of course there are 3 nation-states who are most likely to be behind this operation, but which one was it? If possible, we should be looking for other victims of this attack using the IOCs discovered at Kaspersky. If we find other instances of this attack on Taiwanese government officials or members of the Uighur population, for instance, that would be a smoking gun for attributing it to one particular nation. Finding traces of this attack on the devices of Ukrainian government officials would point in a different direction. Either way, we need to be able to attribute this attack, and the other victims of this APT might not know to check themselves for indicators. Does anyone here know if there are efforts by cybersecurity researchers to uncover other victims of this attack in vulnerable or potentially targeted communities?
评论 #38855487 未加载
评论 #38855925 未加载
评论 #38855429 未加载
评论 #38856636 未加载
评论 #38856015 未加载
评论 #38855930 未加载