ZecOps Profile picture
Jul 18, 2021 5 tweets 2 min read Read on X
[BREAKING] 180+ journalists are confirmed targets of NSO's software including: FT, CNN, NY Times, WSJ, The Economist, AP, and Reuters.
@ZecOps Mobile EDR is the only tool that ever caught NSO automatically. We are offering *free* inspection for journalists to help fight back.
Journalists: Please feel free to contact us at apt@zecops.com.
Journalists / Media Organizations: DM / email us and we'll share an inspection link.
1. NSO 0-days are still at-large: no damage done ✖️
2. NSO domains & processes will change in hours / days: no damage done ✖️
3. ZecOps can systematically detect NSO regardless of (1), (2). 🔥 DM us. ✔️
4. NSO customers saw that the target-list was stored 🤯 UNRECOVERABLE! ✔️

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with ZecOps

ZecOps Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @ZecOps

Feb 11, 2022
הודעה: חברת @ZecOps מתמחה בניתוח תקיפות על טלפונים ניידים. בין לקוחותיה נמנים חברות גדולות, מנכ"לים, עיתונאים, משקיעים, פוליטיקאים, ואפילו מנהיגים עולמיים. לאחר בדיקה ראשונית של שני המכשירים, בסבירות גבוהה מאוד שני המכשירים הודבקו בעבר במה שנראה כהדבקה במשך תקופה ממושכת.
הסימנים החשודים שנמצאו על הניידים לא נפוצים בכלל, ולא נגרמו ע"י המשתמשים. לאחר בדיקה ראשונית בלבד, נראה שכרגע המכשירים "התנקו" כלומר אינם נגועים. אנחנו עדיין בתהליך בדיקה האם נשארו כלים נוספים על המכשיר.
כרגע, @ZecOps ממשיכה בבדיקה של המכשירים ומנתחת שאריות שקשורות לתקיפה על שני המכשירים החשודים. ניתוח מעמיק ייקח זמן. בשלב הראשוני הזה, לא ניתן להצביע על מי עומד מאחורי התקיפה.
Read 7 tweets
Oct 11, 2021
[BREAKING] @Apple just released iOS 15.0.2 and patched CVE-2021-30883, yet another vulnerability in IOMobileFrameBuffer, that was *exploited in the wild*.
[ACTION REQUIRED] Update your iOS devices as soon as you can.
This vulnerability is possibly related to: CVE-2021-30807, also in IOMobileFrameBuffer, that was patched in iOS 14.7.1. The vulnerability provides to attackers kernel privileges after they already gained initial code execution capabilities on the device.
Some technical details and POC of the IOMFB Integer (CVE-2021-30883) Overflow are already available by the fantastic @AmarSaar saaramar.github.io/IOMFB_integer_…
Read 4 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(