
Zhassulan Zhussupov
Malware Researcher, Threat Hunter, ANY.RUN, @cocomelonckz
Cybersecurity enthusiast, author, speaker and mathematician. Author of popular books:
MD MZ Malware Development Book (Github, 2022, 2024)
MALWILD: Malware in the Wild Book (Github, 2023)
Malware Development for Ethical Hackers Book: (Packt, 2024)
AIYA Mobile Malware Development Book (Github, 2025)
Malware Development for Ethical Hackers 2nd edition (Packt, 2026, in progress)
Author and tech reviewer at Packt.
Co founder of various cybersecurity research labs, author of many cybersecurity blogs, HVCK magazine
Malpedia contributor
Speaker at MCTTP, BlackHat, DEFCON, Security BSides, Arab Security Conference, Hack.lu, Standoff, etc conferences
talks & Q&A
Revenge AI and NSO-Generation Mobile Spyware Architecture
Description:
Advanced mobile spyware has crossed a new threshold. A modular, cross-platform implant recovered from compromised iOS and Android devices represents a qualitative leap over prior NSO/Candiru-generation tooling. It does not merely exploit a single vulnerability: it orchestrates a full five-phase kill chain from zero-click media parser exploitation through kernel R/W primitive establishment, dylib/.so injection, stealth persistence, and AI-augmented polymorphic exfiltration - all within the trust boundary of a messaging application.
This talk presents the full reverse-engineered architecture of NSO-based on forensic artifacts, memory dumps, disassembled payloads, and C2 telemetry. We dissect the dual-platform exploit chain (iOS CoreGraphics heap overflow + ARM64 ROP; Android Image Codec OOB write + SELinux bypass), the modular C/Rust/ObjC/Kotlin polyglot implant core, and the first documented evidence of an LLM-integrated C2 server performing server-side dynamic exploit variant generation - a development with profound implications for the future of evasion-by-design.

