Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

iMessage Zero-Click Attacks Suspected in Targeting of High-Value EU, US Individuals

Posted on June 9, 2025June 9, 2025 By CWS

Anomalous crashes on iPhones belonging to high-value people within the EU and US can probably be related to refined zero-click assaults focusing on an iMessage vulnerability, cell EDR agency iVerify says.

The suspicious exercise, noticed in late 2024 and early 2025, with the latest incidents dated March 2025, supposedly focused six units belonging to people affiliated with political campaigns, governments, media organizations, and tech firms within the EU and US.

On 4 of the units, the safety agency discovered signatures related to the exploited vulnerability, referred to as Nickname, whereas the opposite two confirmed clear indicators of exploitation. All victims had been beforehand focused by Chinese language state-sponsored hackers.

No less than one of many victims, iVerify says in a technical report (PDF), obtained an Apple Risk Notification roughly one month after the crashes.

The exploited bug resides in ‘imagent’, the method dealing with iMessage visitors, together with knowledge related to Nickname Updates, a characteristic that permits customers to share customized contact info.

The method makes use of a mutable knowledge container when broadcasting the updates to different elements of the system, and the container could possibly be modified whereas being accessed by different processes, making a race situation that would set off a use-after-free reminiscence corruption flaw.

In line with iVerify, probably the most regarding facet of the safety defect is the truth that it may be triggered with out person interplay, by sending “repeated, rapid-fire nickname updates to iMessage”.

The underlying safety defect, iVerify notes, was seen in units operating iOS variations as much as 18.1.1, and was resolved within the iOS 18.3.1 launch earlier this yr.Commercial. Scroll to proceed studying.

The safety agency’s investigation uncovered the presence of crashes associated to Nickname Updates solely on the units of people probably focused by refined menace actors and believes that it may need been used as half of a bigger exploit chain resulting in system compromise.

On iPhones on which the Nickname vulnerability was possible exploited, iVerify discovered that directories associated to SMS attachments and message metadata had been modified and emptied 20 seconds after the ‘imagent’ course of crashed, a sample of clean-up exercise sometimes related to confirmed spy ware assaults.

“Whereas no smoking gun definitively proving exploitation exists, when taken collectively, this physique of proof offers us average confidence these crashes point out focused exploitation makes an attempt,” iVerify notes, including that circumstantial proof hyperlinks the potential assaults to Chinese language hackers.

SecurityWeek has emailed Apple for an announcement on iVerify’s findings and can replace this text if the corporate responds.

Associated: Apple Patches Main Safety Flaws in iOS, macOS Platforms

Associated: AirPlay Vulnerabilities Expose Apple Units to Zero-Click on Takeover

Associated: Apple Quashes Two Zero-Days With iOS, MacOS Patches

Security Week News Tags:Attacks, HighValue, iMessage, individuals, Suspected, Targeting, ZeroClick

Post navigation

Previous Post: Jenkins Gatling Plugin Vulnerability Let Attackers Bypass Content-Security-Policy Protection
Next Post: Hackers Actively Exploiting Fortigate Vulnerabilities to Deploy Qilin Ransomware

Related Posts

Improperly Patched Samsung MagicINFO Vulnerability Exploited by Botnet Security Week News
Chinese Spies Exploit Ivanti Vulnerabilities Against Critical Sectors Security Week News
Vodafone Germany Fined $51 Million Over Privacy, Security Failures Security Week News
Sharing Intelligence Beyond CTI Teams, Across Wider Functions and Departments Security Week News
Ivanti Patches Two EPMM Zero-Days Exploited to Hack Customers Security Week News
Russian Government Hackers Caught Buying Passwords from Cybercriminals Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • United Natural Foods Suffers Cyberattack
  • Over 70 Organizations Across Multiple Sectors Targeted by China-Linked Cyber Espionage Group
  • Meta Found a New Way to Track Android Users Covertly via Facebook & Instagram
  • Two Distinct Botnets Exploit Wazuh Server Vulnerability to Launch Mirai-Based Attacks
  • Triple Combo – Kimsuky Hackers Attack Facebook, Email, and Telegram Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • United Natural Foods Suffers Cyberattack
  • Over 70 Organizations Across Multiple Sectors Targeted by China-Linked Cyber Espionage Group
  • Meta Found a New Way to Track Android Users Covertly via Facebook & Instagram
  • Two Distinct Botnets Exploit Wazuh Server Vulnerability to Launch Mirai-Based Attacks
  • Triple Combo – Kimsuky Hackers Attack Facebook, Email, and Telegram Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News