iVerify, a mobile MDR (Managed Detection and Response) software company, has identified signs that some iPhones may have been targeted by highly sophisticated, covert hacking techniques. These attacks are believed to involve “zero-click” exploits—methods that can compromise devices silently, without any action from the user.
These findings highlight how even the most secure smartphones are vulnerable to sophisticated threats that operate silently and without user interaction.
Researchers observed rare crash patterns on certain targeted iPhone devuces. These crashes are extremely uncommon—making up less than 0.001% of crash logs from a sample of 50,000 devices—and only appeared on devices linked to high-profile individuals, such as government officials and activists.
Further analysis uncovered a previously unknown vulnerability in the iPhone’s core messaging process, called “imagent.” This flaw could be exploited through repeated, rapid updates to contact nicknames sent via iMessage. When triggered, it causes the phone to crash, which could potentially serve as a first step for attackers to gain control of the device.
Are Devices at Risk?
Apple has addressed this vulnerability patching it in the latest iOS update (18.3.1). But while the fix removes this specific weakness, experts warn that other parts of the exploit chain might still be active or could be used in new attacks. And targeted attacks using similar techniques may still be ongoing or could resume in the future.
The potential for such covert attacks raises concerns about privacy and security, especially for individuals in sensitive roles. If a device is compromised, an attacker could access private messages, emails, and other personal information—regardless of encryption or security measures. The best defense remains keeping your device updated with the latest software, being cautious with unsolicited communications, and staying informed about emerging threats if dealing with confidential or valuable data. As research continue, experts recommend monitoring for any unusual device behavior and applying updates promptly to reduce risk.
Check out the full technical report including detailed analysis and ongoing updates on iVerify’s research report.
Leave a Reply