You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Suspicious ODoH-based DNS beaconing was observed on a non-jailbroken iOS 18.6.2 device. Apple-signed system processes initiated encrypted queries every 60 seconds, triggered by Bluetooth events. The behavior suggests covert telemetry or spyware leveraging system-trusted execution paths.
his case study investigates a covert beaconing pattern in which a compromised host periodically sent outbound DNS queries to Google's public resolver (8.8.8.8) at 30-minute intervals without receiving responses.