Stealing your SMS messages with iOS 0day
Tags
attack-pattern: | Data Python - T1059.006 Server - T1583.004 Server - T1584.004 Sms Messages - T1636.004 |
Common Information
Type | Value |
---|---|
UUID | ce163f08-ddc9-4029-a27c-b6657fa1ba25 |
Fingerprint | bd4b8c08cbfe28ac |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | April 30, 2020, midnight |
Added to db | Feb. 17, 2023, 9:36 p.m. |
Last updated | Nov. 17, 2024, 5:57 p.m. |
Headline | Stealing your SMS messages with iOS 0day |
Title | Stealing your SMS messages with iOS 0day |
Detected Hints/Tags/Attributes | 21/1/14 |
Source URLs
Redirection | Url | |
---|---|---|
Details | Source | https://wojciechregula.blog/post/stealing-your-sms-messages-with-ios-0day/ |
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 3 | siguza.github.io |
|
Details | Domain | 111 | www.apple.com |
|
Details | Domain | 3 | com.apple.private.security.no |
|
Details | Domain | 2 | com.apple.private.security.storage |
|
Details | Domain | 1 | sandboxescape.app |
|
Details | Domain | 4 | wojciechregula.blog |
|
Details | Domain | 3 | self.rfile.read |
|
Details | File | 8 | sms.db |
|
Details | File | 1 | filemanager.ini |
|
Details | File | 9 | shared.dat |
|
Details | File | 5 | entitlements.xml |
|
Details | IPv4 | 3 | 192.168.0.14 |
|
Details | Url | 1 | https://siguza.github.io/psychicpaper |
|
Details | Url | 73 | http://www.apple.com/dtds/propertylist-1.0.dtd |