Google Uncovers How Just Visiting Some Sites Were Secretly Hacking iPhones For Years

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Beware Apple users!

Your iPhone can be hacked just by visiting an innocent-looking website, confirms a terrifying report Google researchers released earlier today.

The story goes back to a widespread iPhone hacking campaign that cybersecurity researchers from Google's Project Zero discovered earlier this year in the wild, involving at least five unique iPhone exploit chains capable of remotely jailbreaking an iPhone and implanting spyware on it.

Those iOS exploit chains were found exploiting a total of 14 separate vulnerabilities in Apple's iOS mobile operating system—of which 7 flaws resided in Safari web browser, 5 in the iOS kernel and 2 separate sandbox escape issues—targeting devices with almost every version in that time-frame from iOS 10 through to the latest version of iOS 12. Though the technical details and background story of both then-zero-day vulnerabilities were not available at that time, The Hacker News warned about both the flaws in February after Apple released iOS version 12.1.4 to address them.

"We reported these issues to Apple with a 7-day deadline on 1 Feb 2019, which resulted in the out-of-band release of iOS 12.1.4 on 7 Feb 2019. We also shared the complete details with Apple, which were disclosed publicly on 7 Feb 2019," Beer says.

Now, as Google researcher explained, the attack was being carried out through a small collection of hacked websites with thousands of visitors per week, targeting every iOS user landing on those websites without discrimination.

"Simply visiting the hacked site was enough for the exploit server to attack your device, and if it was successful, install a monitoring implant," Beer says.

Once an iPhone user visited one of the hacked websites through the vulnerable Safari web browser, it triggered WebKit exploits for each exploit chain in an attempt to gain an initial foothold onto the user's iOS device and stage the privilege escalation exploits to further gain root access to the device, which is The iPhone exploits were used to deploy an implant primarily designed to steal files like iMessages, photos, and live GPS location data of users, and upload them to an external server every 60 seconds.

"There is no visual indicator on the device that the implant is running. There's no way for a user on iOS to view a process listing, so the implant binary makes no attempt to hide its execution from the system," Beers explains.

The spyware implant also stole the database files from the victim's device used by popular end-to-end encryption apps like Whatsapp, Telegram, and iMessage to store data, including private chats in the

Contact Us

Labone 2

154 South Lipsum Avenue

Greater Accra, Ghana.


Tell: +233 204 084 627


Muscom Tech is the most popular e-Learning platform for online delivery of training, optimizing time and reducing costs associated with traditional learning methods. Join for Free to enhance your skills and knowledge .