Recent iPhone models have additional hardware-based security protection for sensitive regions of the kernel memory. We discovered that to bypass this hardware-based security protection, the attackers used another hardware feature of Apple-designed SoCs.
My money is on leaked or stolen internal documents or tools, or plain old fashioned fuzzing and trial and error.
Ke
It’ll be interesting to see if they’re able to attribute the attack to anyone.
My money is on a state actor, considering the targets they found with the malware