Thanks for sharing! I’m amazed at how sophisticated this was.
Comment on 4-year campaign backdoored iPhones using possibly the most advanced exploit ever
elias_griffin@lemmy.world 1 year ago
I recently invented a “People First” Cybersecurity Vulnerability Scoring method and I called it CITE, Civilian Internet Threat Evaluation with many benefits over CVSS. In it, I prioritize “exploit chains” as the primary threat going forward. Low and behold, this new exploit, although iOS, possibly one of the most sophisticated attacks ever using one of the longest exploit chains ever! Proof positive!
Depending on how you define it; I define the Kaspersky diagram has 8 steps. In my system, I define steps that advance the exploit discretely as stages, so I would evaluated Triangulation to be a 4 stage exploit chain. I should tally this attack to see how it scores and make a CITE-REP(ort).
You can read about it if interested. An intersting modeling problem for me was does stages always equate to complexity? Number of exploits in the chain make it easier or harder to intrusion detect given that it was designed as a chain, maybe to prevent just that? How are stages, complexity, chains and remediation evaluted inversely?
return2ozma@lemmy.world 1 year ago
corsicanguppy@lemmy.ca 1 year ago
Sooo, xkcd 927?
kboy101222@sh.itjust.works 1 year ago
That’s Standards, isn’t it?
shea@lemmy.blahaj.zone 1 year ago
is this how people who quote Bible verses feel? i can just surmise the meaning by the number and the context
SnipingNinja@slrpnk.net 1 year ago
I just surmise by the context and end up usually correct so the numbers haven’t quite clicked in yet
kboy101222@sh.itjust.works 1 year ago
It must be, cause I immediately recognized the numbers.
unconfirmedsourcesDOTgov@lemmy.sdf.org 1 year ago
Link for the lazy
crsu@lemmy.world 1 year ago
no garfield 3:16