The research discovered a previously unknown vulnerability, dubbed NICKNAME, in the “imagent” process of iPhones, which was exploited in targeted attacks against high-value targets in the US and EU. The vulnerability was patched by Apple in iOS 18.3, but the research suggests it may be part of a larger exploit chain. The finding highlights the importance of adapting mobile security models to face modern threats, particularly in the context of SignalGate and the potential compromise of mobile devices.
Related topics
| Topic | Replies | Views | Activity | |
|---|---|---|---|---|
| iVerify reports iOS 26 deletes clues for spyware infections on reboot | 3 | 633 | October 25, 2025 | |
| PSA: Update Apple OSes to fix the latest security vulnerability that has been exploited | 2 | 344 | August 21, 2025 | |
| Apple alerts exploit developer that his iPhone was targeted with government spyware | 5 | 637 | October 21, 2025 | |
| Apple's app tracking privacy framework could fall foul of German antitrust | 25 | 1585 | October 25, 2025 | |
| 2025.09.12 | 0 | 2581 | September 12, 2025 |