Cybersecurity researchers have found a brand new post-exploit persistence approach on iOS 16 that permits attackers to keep up entry to an Apple system even when the sufferer believes it’s in Airplane Mode. The approach entails tricking the sufferer into pondering Airplane Mode is enabled, whereas the attacker maintains a mobile community connection for their very own malicious utility. The technique entails UI modifications and adjustments to the CommCenter daemon. By disguising the mobile information entry standing of particular apps, the attacker could make it seem as if Airplane Mode is on whereas nonetheless permitting their utility to entry the web. The faux Airplane Mode acts similar to the true one, besides that it would not apply to non-application processes.
Source hyperlink