zlacker

[parent] [thread] 0 comments
1. bogomi+(OP)[view] [source] 2021-07-21 03:39:11
The article states:

>"A more worrying set of attacks appear to use Apple’s iMessage to perform “0-click” exploitation of iOS devices. Using this vector, NSO simply “throws” a targeted exploit payload at some Apple ID such as your phone number, and then sits back and waits for your zombie phone to contact its infrastructure."

Does anyone have a link or any resources that describe how this “0-click” exploitation" works?

[go to top]