home bbs files messages ]

Forums before death by AOL, social media and spammers... "We can't have nice things"

   comp.sys.mac.advocacy      Steve Jobs fetishistic worship forum      120,746 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 119,033 of 120,746   
   Your Name to Brock McNuggets   
   Re: Yet another iOS Zero-Day Exploit Cha   
   06 Dec 25 11:00:09   
   
   XPost: misc.phone.mobile.iphone   
   From: YourName@YourISP.com   
      
   On 2025-12-05 12:44:10 +0000, Brock McNuggets said:   
      
   > On Dec 4, 2025 at 9:47:11 PM MST, "Marian" wrote   
   > <10gto4f$202m$1@nnrp.usenet.blueworldhosting.com>:   
   >   
   >> Yet another iOS Zero-Day Exploit Chain Apple never caught   
   >> https://cybersecuritynews.com/ios-zero-day-exploit-chain-leveraged/   
   >>   
   >> Note that there are so many holes in iOS, that this chain exploited three   
   >> zero-day holes in a row - which proves Apple is incompetent at QA testing.   
   >>   
   >> The main reason Apple doesn't catch these is Apple only advertises   
   >> security. There never was security on an iPhone. It's all propaganda.   
   >>   
   >> This newly disclosed chain of flaws is a chain of three iOS zero-day   
   >> vulnerabilities that let attackers go from a single Safari link click to   
   >> full spyware control of an iPhone.   
   >>   
   >> Stage 1 - Safari Remote Code Execution   
   >> Vulnerability: CVE-2023-41993   
   >> Method: Malicious link opened in Safari   
   >> Result: Attacker gains arbitrary read/write access inside Safari process   
   >> Tool: JSKit framework used to run native code   
   >>   
   >> Stage 2 - Sandbox Escape and Kernel Privilege Escalation   
   >> Vulnerabilities: CVE-2023-41992 and CVE-2023-41991   
   >> Method: Exploit breaks out of Safari sandbox   
   >> Result: Attacker escalates privileges to kernel level   
   >> Codename: PREYHUNTER   
   >>   
   >> Stage 3 - Spyware Deployment   
   >> Payload: Predator spyware modules   
   >> Components: Helper and Watcher modules   
   >> Capabilities: Record VoIP calls, capture camera and microphone,   
   >> log keystrokes, hide notifications   
   >> Stealth: Stops if security tools or analysis are detected   
   >>   
   >> Note that the only people who think iOS is secure are people who know   
   >> nothing, especially since Google proved iOS code has NEVER been tested!   
   >   
   > Yeah, that exploit chain was real — three zero‑days (41993, 41992, 41991)   
   > chained together so a single malicious Safari link could lead to full device   
   > compromise. Predator spyware used it in the wild. Apple patched the issues   
   > once researchers disclosed them.   
   >   
   > But that still doesn’t prove the whole platform is worthless. Every major   
   OS   
   > has zero‑days, including Android and Chrome. What this shows is the   
   obvious:   
   > iOS isn’t magically unbreakable and never has been. Skilled attackers can   
   and   
   > do find holes, and patches matter.   
   >   
   > If you’ve got an argument beyond “Apple is incompetent because   
   zero‑days   
   > exist,” make it. Otherwise you’re just turning normal security research   
   into a   
   > conspiracy theory.   
      
   There's also the fact that 99.9% of these supposed malware problems are   
   theoreticcal and reported by companies who sell anti-malware software   
   ... big surpise, NOT! Almost none have have ever been found on anyone's   
   actual device in the real world, even before being fixed by a security   
   patch.   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca