Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

yeah, I'm wondering if it's re-exploit on boot or actual subversion of the OS though


What's the difference? :)

It's explained in detail here: https://info.lookout.com/rs/051-ESQ-475/images/lookout-pegas...

Apparently it overwrites a system binary that's launched on boot with another apple-signed binary "jsc" (a console javascript interpreter), which will evaluate some sort of .js that re-exploits everything. Pretty clever to re-use apple-signed binaries for nefarious purposes. (The binary must be apple-signed because when booting the kernel isn't exploited yet and so it enforces code signing, obviously).




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: