Infosec.Pub
  • Communities
  • Create Post
  • Create Community
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
digicatM to blueteamsecEnglish · 7 days ago

Predator iOS Malware: Building a Surveillance Framework - Part 1

blog.reversesociety.co

external-link
message-square
0
link
fedilink
1
external-link

Predator iOS Malware: Building a Surveillance Framework - Part 1

blog.reversesociety.co

digicatM to blueteamsecEnglish · 7 days ago
message-square
0
link
fedilink
Predator iOS Malware: Building a Surveillance Framework - Part 1 | Reverse Society
blog.reversesociety.co
external-link
How does Predator spyware transform from running code into active surveillance? This technical deep-dive reverse-engineers the internal factory architecture that dynamically creates camera monitoring, VoIP interception, and keylogging modules through Unix socket commands revealing the infrastructure between exploitation and surveillance
alert-triangle
You must log in or # to comment.

blueteamsec

blueteamsec

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !blueteamsec@infosec.pub

For [Blue|Purple] Teams in Cyber Defence - covering discovery, detection, response, threat intelligence, malware, offensive tradecraft and tooling, deception, reverse engineering etc.

Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 9 users / day
  • 74 users / week
  • 291 users / month
  • 950 users / 6 months
  • 219 local subscribers
  • 591 subscribers
  • 1.99K Posts
  • 160 Comments
  • Modlog
  • mods:
  • digicat
  • BE: 0.19.13
  • Modlog
  • Instances
  • Docs
  • Code
  • join-lemmy.org