I found a secret protocol in Predator Spyware – iOS

(youtube.com)

1 points | by tonygo 10 hours ago ago

1 comments

  • tonygo 10 hours ago ago

    How does mercenary spyware actually control an iPhone? In this video, I reverse engineer the Predator spyware to uncover the secret internal protocol it uses to activate surveillance modules.

    This is a summary of my technical research published on the Reverse Society blog. While analyzing the surveillance framework, I discovered a hidden custom text-based protocol that orchestrates the malware's operations (Camera, VoIP, etc.).