Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

38C3 - From Pegasus to Predator - The evolution of Commercial Spyware on iOS

Автор: media.ccc.de

Загружено: 2025-01-04

Просмотров: 8463

Описание:

My talk explores the trajectory of iOS spyware from the initial discovery of Pegasus in 2016 to the latest cases in 2024.

The talk will start with an analysis how exploits, infection vectors and methods of commercial spyware on iOS have changed over time.

The second section of the talk is all about advances in detection methods and the forensic sources which are available to discover commercial spyware. This talk will also include a Case Study about the discovery and analysis of BlastPass (one of the latest NSO Exploits).

The third part will discuss technical challenges and limitations of the detections methods and data sources.

Finally, I will conclude the talk with open research topics and suggestions what Apple or we could technically do to make the detection of commercial spyware better.

The commercial spyware landscape on iOS has evolved significantly since the discovery of Pegasus in 2016. In this talk, we’ll explore that evolution through four main areas:

1. Spyware Evolution (2016-2024): By analyzing key exploits, tactics, techniques, and procedures (TTPs), infection vectors, and indicators of compromise (IOCs), we’ll trace how spyware has advanced in sophistication, highlighting changes that have led to today’s complex threats.
2. Advancements in Detection: As spyware has grown more sophisticated, so too have detection capabilities. We’ll review the main actors, public organizations and tools that have shaped spyware detection. This part will also include a case study on my discovery and analysis of a sample NSO‘s BlastPass Exploit chain.
3. Current and Future Challenges: Looking forward, we’ll examine the pressing challenges in spyware detection and speculate on how commercial spyware might evolve in response to new security measures and technologies.
4. Recommendations for Research and Detections: Finally, I’ll offer recommendations for advancing research and detection methods and capabilities to combat commercial spyware.

Attendees will gain a comprehensive view of the past, present, and future of spyware on iOS, along with actionable strategies for future research and collaboration.

Matthias Frielingsdorf

https://events.ccc.de/congress/2024/h...

#38c3 #Security

Licensed to the public under http://creativecommons.org/licenses/b...

38C3 - From Pegasus to Predator - The evolution of Commercial Spyware on iOS

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

38C3 - We've not been trained for this: life after the Newag DRM disclosure

38C3 - We've not been trained for this: life after the Newag DRM disclosure

38C3 - Find My * 101

38C3 - Find My * 101

Conversation with Elon Musk | World Economic Forum Annual Meeting 2026

Conversation with Elon Musk | World Economic Forum Annual Meeting 2026

OSINT для новичков: найдите всё о юзернейме и фото с Sherlock и Google Dorks!

OSINT для новичков: найдите всё о юзернейме и фото с Sherlock и Google Dorks!

The Next Generation of Web Exploits - Steve Sprecher(BSides CT 2025)

The Next Generation of Web Exploits - Steve Sprecher(BSides CT 2025)

Edward Snowden on Pegasus spyware: 'This is an industry that should not exist'

Edward Snowden on Pegasus spyware: 'This is an industry that should not exist'

38C3 - Windows BitLocker: Screwed without a Screwdriver

38C3 - Windows BitLocker: Screwed without a Screwdriver

Утечки шпионского ПО Pegasus

Утечки шпионского ПО Pegasus

ОБЫЧНЫЙ VPN УМЕР: Чем обходить блокировки в 2026

ОБЫЧНЫЙ VPN УМЕР: Чем обходить блокировки в 2026

Сисадмины больше не нужны? Gemini настраивает Linux сервер и устанавливает cтек N8N. ЭТО ЗАКОННО?

Сисадмины больше не нужны? Gemini настраивает Linux сервер и устанавливает cтек N8N. ЭТО ЗАКОННО?

37C3 -  Operation Triangulation: What You Get When Attack iPhones of Researchers

37C3 - Operation Triangulation: What You Get When Attack iPhones of Researchers

Debian: САМЫЙ СТАБИЛЬНЫЙ Linux и ТЁМНАЯ История Создателя

Debian: САМЫЙ СТАБИЛЬНЫЙ Linux и ТЁМНАЯ История Создателя

Чем ОПАСЕН МАХ? Разбор приложения специалистом по кибер безопасности

Чем ОПАСЕН МАХ? Разбор приложения специалистом по кибер безопасности

WTF dude..

WTF dude..

Detect: iPhone Triangulation Spyware with tool by Kaspersky

Detect: iPhone Triangulation Spyware with tool by Kaspersky

The World's Most Important Machine

The World's Most Important Machine

Mobile Espionage in the Wild: Pegasus and Nation-State Level Attacks

Mobile Espionage in the Wild: Pegasus and Nation-State Level Attacks

Я УДАЛИЛ Claude Code – Вот, что я использую сейчаc

Я УДАЛИЛ Claude Code – Вот, что я использую сейчаc

Мой опыт перехода с MacOS на Linux | Полный гайд

Мой опыт перехода с MacOS на Linux | Полный гайд

Operation Triangulation: What You Get When Attack iPhones of Researchers

Operation Triangulation: What You Get When Attack iPhones of Researchers

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: infodtube@gmail.com