Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The implant binary does not persist on the device; if the phone is rebooted then the implant will not run until the device is re-exploited when the user visits a compromised site again. [1]

1. https://googleprojectzero.blogspot.com/2019/08/implant-teard...



Just important to note that restarting the device is not the end of it. "Given the breadth of information stolen, the attackers may nevertheless be able to maintain persistent access to various accounts and services by using the stolen authentication tokens from the keychain, even after they lose access to the device."

I would recommend checking your login history / OAuth permissions to anything you had in your keychain, changing passwords for anything critical you used on your device if you suspect you were infected, a restart won't undo stolen information.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: