Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » New iShutdown method reveals hidden spyware like Pegasus on iPhone
    Cyber Security

    New iShutdown method reveals hidden spyware like Pegasus on iPhone

    techempireBy techempire3 Comments2 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    ReportJanuary 17, 2024Editorial DepartmentSpyware/Forensic Analysis

    Pegasus on iPhone

    Cybersecurity researchers have discovered a “lightweight method” called Shut down Reliably identifies signs of spyware on Apple iOS devices, including notorious threats such as NSO Group’s Pegasus, QuaDream’s Reign and Intellexa’s Predator.

    Kaspersky analyzed a group of iPhones compromised by Pegasus and said the infection left traces in a file called “Shutdown.log,” a text-based system log file available on all iOS devices. Each restart event and its environmental characteristics are logged.

    Internet security

    “Retrieving the Shutdown.log file is fairly simple compared to more time-consuming acquisition methods such as forensic device imaging or full iOS backups,” said security researcher Maher Yamout. “The log files are stored in sysdiagnose (sysdiag) archives.”

    The Russian cybersecurity firm said it discovered entries in log files documenting instances where “sticky” processes, such as those related to spyware, caused restart delays, in some cases More than four restart delay notifications were observed for processes related to Pegasus.

    What’s more, the investigation found that all three spyware families use similar file system paths – “/private/var/db/” for Pegasus and Reign, and “/private/var/tmp/” for Predator – thus acting as compromises index of.

    Shut down

    That said, the success of this approach depends on the target rebooting their device as frequently as possible, with the frequency varying based on their threat profile.

    Kaspersky has also released a series of Python scripts to extract, analyze and parse Shutdown.log to extract restart statistics.

    “The lightweight nature of this method makes it easy to use and access,” Yamut said. “Additionally, the log archive can store entries for several years, making it a valuable forensic artifact for analyzing and identifying anomalous log entries.”

    Internet security

    The revelation comes as SentinelOne revealed that information-stealing programs targeting macOS such as KeySteal, Atomic and JaskaGo (aka CherryPie or Gary Stealer) are rapidly adapting to circumvent Apple’s built-in antivirus technology called XProtect.

    “Despite Apple’s efforts to update its XProtect signature database, these rapidly evolving malware strains continue to evade,” said security researcher Phil Stokes. “Relying on signature-based detection alone is not enough. Yes, because threat actors have the means and motivation to adapt quickly.”

    Did you find this article interesting?follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Gateway Studios High-Tech Recording Studio To Open In Chesterfield, Missouri

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.