Four-Year Campaign Backdoored Iphones Using Undocumented Hardware Function
The secret hardware function targeted by the attackers allowed them to bypass advanced memory protections, enabling post-exploitation techniques and compromising system integrity.