From zdnet.com
![SQLite](https://zdnet2.cbsistatic.com/hub/i/2019/08/10/35a6c76d-3578-4164-ae0b-3ce3c84e7b3c/548704c82041e649389b257ca7e01b0b/sqlite.jpg)
In demos presented at the DEF CON security conference in Las Vegas today, Check Point security researcher Omer Gull showed demos of a tainted SQLite database hijacking the command and control server of a malware operation, and malware using SQLite to achieve persistence on iOS devices.
SQLite databases can be modified in such a way that they execute malicious code inside other apps that rely on them to store data, security researchers have revealed.