73 Matching Annotations
  1. Aug 2021
    1. Smith observed that one worker alone might make 20 pins in a day, but that a small business of 10 workers (some of whom would need to do two or three of the 18 tasks involved with pin-making), could make 48,000 pins in a day. How can a group of workers, each specializing in certain tasks, produce so much more than the same number of workers who try to produce the entire good or service by themselves? Smith offered three reasons.

      Pipelining too

  2. Jul 2021
    1. System log files also reveal the location of Pegasus binaries on disk. These file names match those we have consistently observed in the process execution logs presented earlier. The binaries are located inside the folder /private/var/db/com.apple.xpc.roleaccountd.staging/ which is consistent with the findings by Citizen Lab in a December 2020 report.
    2. multiple successful zero-click infections in May and June 2021. We can see one example of this on 17 May 2021. An unfamiliar iMessage account is recorded and in the following minutes at least 20 iMessage attachment chunks are created on disk.

      adding email to contact list to trigger user-discovery routine as a trigger for the infection.

    3. While we have not been able to extract records from Cache.db databases due to the inability to jailbreak these two devices, additional diagnostic data extracted from these iPhones show numerous iMessage push notifications immediately preceding the execution of Pegasus processes

      malware pushed using a legitimate app's push message. first of its kind of attack.

    4. Although versions 14.4.1 and 14.4.2 were already available then, they only addressed vulnerabilities in WebKit, so it is safe to assume the vulnerability leveraged in these iMessage attacks was exploited as a 0-day.

      ..

    5. It is interesting to note that in the traces Amnesty International recovered from 2019, the iMessage lookups that immediately preceded the execution of suspicious processes often contained two-bytes 0x00 padding in the email address recorded by the ID Status Cache file
    6. However, while it is only effective on domestic networks, the targeting of foreign targets or of individuals in diaspora communities also changed

      possibly the malware synced in through rogue icloud accounts which were surreptitiously added to the target device, or through a trigger based on iMessage sync for a canary email address.

    7. Network injection is an effective and cost-efficient attack vector for domestic use especially in countries with leverage over mobile operators

      leverage with mobile operators can be used for redirection attacks. if mobile no is equal to this, when the user requests this url, redirect him to this url

    8. iOS maintains records of process executions and their respective network usage in two SQLite database files called “DataUsage.sqlite” and “netusage.sqlite” which are stored on the device. It is worth noting that while the former is available in iTunes backup, the latter is not. Additionally, it should be noted that only processes that performed network activity will appear in these databases.
  3. Nov 2019