Attack stages
Regardless of the targeted architecture, generally, malware has to go through the same stages in order to achieve its goals; however, the implementation can be quite different. Let’s go through the most important of them.
Jailbreaks on demand
To begin, let’s talk about jailbreaks in greater detail. Jailbreaking generally applies to iOS mobile devices and involves obtaining elevated privileges in order to remove certain software restrictions. There are multiple reasons why users may want to do this to their devices:
- Getting access to extra functionality: In this case, a user becomes able to tweak the operating system appearance or get access to unsupported features.
- Unlocking carrier-locked phones: This may help unlock devices so that they can be used with other mobile carriers.
- Installing unapproved or pirated software: Here, examples include older versions of software, custom input systems (popular in China), or generic App Store software...