Hacker News new | past | comments | ask | show | jobs | submit login

I’m unfortunately not able to view on desktop since I’m traveling but I’ll have to take a look upon my return tomorrow. Seems fishy the fact it was flagged with lockdown is suspicious.



Alarm bells and a half.

Looking at all the behavioural analysis on VT makes it look like malware, but considering my lockdown iOS was being weird, this PDF is making me worry that it’s some sort of cross platform malware capable of attacking both Windows and iOS - which I have never heard malware being able to do before.

I am super curious of how this PDF behaves on MacOS, Linux and Android now but it seems VT only executes it in a Windows environment.

I could be so wrong about this, but if I am not, then this would be rather serious indeed for a lot of HN users.


> then this would be rather serious indeed for a lot of HN users

It would be even more serious for the Usenix Security conference that posted the paper!


I can’t say for sure, I cannot get it to pop that same error again. I will try opening it from another iPhone with lockdown enabled later.

I wouldn’t even know where to start in looking at that PDF for some sort of iOS exploit payload, my guess is it would be extremely difficult to find (if it exists).


For the historical record, the Usenix Security paper PDF comment currently has 28 upvotes.

There is also your non-reproducible report that the PDF was incorrectly loaded as an Apple Wallet pass, which would require a web server MIME type of:

  application/vnd.apple.pkpass




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: