If You Can't Break Crypto, Break the Client: Recovery of Plaintext…
Tags
maec-delivery-vectors: | Watering Hole |
attack-pattern: | Data Content Injection - T1659 Javascript - T1059.007 Server - T1583.004 Server - T1584.004 Ssh - T1021.004 Vulnerabilities - T1588.006 Scripting - T1064 Scripting |
Common Information
Type | Value |
---|---|
UUID | 36a4c528-2129-4e5e-958d-8dab27a1d27d |
Fingerprint | e53b941b0ca74fa9 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | Dec. 27, 2022, midnight |
Added to db | Jan. 18, 2023, 10:48 p.m. |
Last updated | Nov. 12, 2024, 3:53 p.m. |
Headline | If You Can't Break Crypto, Break the Client: Recovery of Plaintext iMessage Data |
Title | If You Can't Break Crypto, Break the Client: Recovery of Plaintext… |
Detected Hints/Tags/Attributes | 40/2/13 |
Source URLs
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | CVE | 1 | cve-2016-1764 |
|
Details | Domain | 12 | bishopfox.com |
|
Details | Domain | 3 | oreq.open |
|
Details | Domain | 359 | com.apple |
|
Details | File | 19 | 1.js |
|
Details | File | 1 | chat.db |
|
Details | File | 24 | apple.log |
|
Details | File | 10 | inwindow.pl |
|
Details | File | 4 | photo.php |
|
Details | File | 3 | payload.js |
|
Details | File | 9 | nw.js |
|
Details | Url | 1 | http://example.com/1.js';document.body.appendchild(s)})(document.createelement |
|
Details | Url | 1 | http://yourhostname:8888/f/payload.js';document.body.appendchild(s)})(document.createelement |