← Back to context

Comment by bogomipz

4 years ago

The article states:

>"A more worrying set of attacks appear to use Apple’s iMessage to perform “0-click” exploitation of iOS devices. Using this vector, NSO simply “throws” a targeted exploit payload at some Apple ID such as your phone number, and then sits back and waits for your zombie phone to contact its infrastructure."

Does anyone have a link or any resources that describe how this “0-click” exploitation" works?