Thanks for sharing! I’m amazed at how sophisticated this was.
Comment on 4-year campaign backdoored iPhones using possibly the most advanced exploit ever
elias_griffin@lemmy.world 10 months ago
I recently invented a “People First” Cybersecurity Vulnerability Scoring method and I called it CITE, Civilian Internet Threat Evaluation with many benefits over CVSS. In it, I prioritize “exploit chains” as the primary threat going forward. Low and behold, this new exploit, although iOS, possibly one of the most sophisticated attacks ever using one of the longest exploit chains ever! Proof positive!
Depending on how you define it; I define the Kaspersky diagram has 8 steps. In my system, I define steps that advance the exploit discretely as stages, so I would evaluated Triangulation to be a 4 stage exploit chain. I should tally this attack to see how it scores and make a CITE-REP(ort).
You can read about it if interested. An intersting modeling problem for me was does stages always equate to complexity? Number of exploits in the chain make it easier or harder to intrusion detect given that it was designed as a chain, maybe to prevent just that? How are stages, complexity, chains and remediation evaluted inversely?
return2ozma@lemmy.world 10 months ago
corsicanguppy@lemmy.ca 10 months ago
Sooo, xkcd 927?
kboy101222@sh.itjust.works 10 months ago
That’s Standards, isn’t it?
shea@lemmy.blahaj.zone 10 months ago
is this how people who quote Bible verses feel? i can just surmise the meaning by the number and the context
SnipingNinja@slrpnk.net 10 months ago
I just surmise by the context and end up usually correct so the numbers haven’t quite clicked in yet
kboy101222@sh.itjust.works 10 months ago
It must be, cause I immediately recognized the numbers.
unconfirmedsourcesDOTgov@lemmy.sdf.org 10 months ago
Link for the lazy
crsu@lemmy.world 10 months ago
no garfield 3:16