Phone Hack Researchers say suspected nation-state hackers infected Apple iPhones with spyware over two years in what security experts on Friday called an alarming security failure for a company whose calling card is privacy.
A mere visit to one of a small number of tainted websites could infect an iPhone with an implant capable of sending the smartphone owner's text messages, email, photos and real-time location data to the cyberspies behind the operation.
"This is definitely the most serious iPhone hacking incident that's ever been brought to public attention, both because of the indiscriminate targeting and the amount of data compromised by the implant," said former U.S. government hacker Jake Williams, the president of Rendition Security.
Announced by Google researchers, the last of the vulnerabilities were quietly fixed by Apple by February but only after thousands of iPhone users were believed exposed over more than two years.
The researchers did not identify the websites used to seed the spyware or their location.
They also did not say who was behind the cyberespionage or what population was targeted, but experts said the operation had the hallmarks of a nation-state effort.
Williams said the spyware implant wasn't written to transmit stolen data securely, indicating the hackers were not concerned about getting caught.
That suggests an authoritarian state was behind it.
He speculated that it was likely used to target political dissidents.
Sensitive data accessed by the spyware included WhatsApp, iMessage and Telegram text messages, Gmail, photos, contacts and real-time location - essentially all the databases on the victim's phone.
While the messaging applications may encrypt data in transit, it is readable at rest on iPhones.
Apple did not respond to requests for comment on why it did not detect the vulnerabilities on its own and if it can assure users that such a general attack could not happen again.
Privacy assurance is central to the Apple brand.
Smartphone users must ultimately "be conscious of the fact that mass exploitation still exists and behave accordingly;" wrote Google researcher Beer.
He continued: "treating their mobile devices as both integral to their modern lives, yet also as devices which when compromised, can upload their every action into a database to potentially be used against them."