Two full iOS exploit kits in one month, deployed via watering holes on public websites, potentially affecting hundreds of millions of devices. Will Apple acknowledge that this no longer fits the “very small number of highly targeted individuals” narrative?
Other info:
DarkSword supports iOS versions 18.4 through 18.7
This suggests that UNC6748 didn’t have an exploit chain for Chrome at the time of this activity.
I agree. What is concerning is how dismissive Apple is with pentesters, calling the recent high severity attacks as targeted, instead of seeing the method of delivery makes it very much mass spyware.