1. Deliver Malicious App via Authorised App Store. 2. Deliver Malicious App via Other Means. 3. Drive-by Compromise. 4. Exploit via Charging Station or System. 5. Exploit via Radio Interfaces. 6. Install Insecure or Malicious Configuration. 7. Lockscreen Evasion. 8. Masquerade as Legitimate Apps. 9. Supply Chain Compromise.
Persistence of Adversaries in the iOS
1. Code Injection. 2. Modify OS Kernel or Boot Partition. 3. Modify System Partition.
Privilege Escalation of Adversaries in the iOS
1. Code Injection. 2. Exploit iOS Vulnerability.
Defence Evasion of Adversaries in the iOS
1. Application Discovery. 2. Code Injection. 3. Device Lockout. 4. Disguise Root/Jailbreak Indicators. 5. Download New Code at Runtime. 6. Evade Analysis Environment. 7. Install Insecure or Malicious Configuration. 8. Masquerade as Legitimate Apps. 9. Modify OS Kernel or Boot Partition. 10. Modify System Partition. 11. Obfuscated Files or Information.