Comment by bogomipz
4 years ago
The article states:
>"A more worrying set of attacks appear to use Apple’s iMessage to perform “0-click” exploitation of iOS devices. Using this vector, NSO simply “throws” a targeted exploit payload at some Apple ID such as your phone number, and then sits back and waits for your zombie phone to contact its infrastructure."
Does anyone have a link or any resources that describe how this “0-click” exploitation" works?
No comments yet
Contribute on Hacker News ↗