TECH

Exploit seller wants $2 million for iMessage zero-day attack vector that probably doesn't exist

iMessage on iPhone

$2M iMessage Exploit Posted on the Dark Web Probably Doesn't Do What Sellers Say . yes, but it's still a reminder that the iPhone is not hack-proof.

According to a post on X on April 15, Trust Wallet has discovered credible evidence related to a high-risk zero-day exploit targeting iMessage users. The exploit could allegedly gain access to an iPhone without requiring the user to click any links.

As a precaution, Trust Wallet offers iPhone users — especially valuable people — Turn off iMessage until Apple fixes the problem.

It is important to note, as Tech Crunch highlights, that there is currently no definitive proof of the exploit's existence. The “proof” comes from an ad on the dark web for something called “iMessage Exploit.”

The advertisement states that the product is RCE — remote code execution — it does not require any interaction from the target. Supposedly it runs on the latest version of iOS.

CodeBreach Lab, the seller of the alleged exploit, is asking for $2 million in Bitcoin. At the moment, no one has bought the exploit.

While this threat is likely exaggerated or an outright scam, it is still important to understand why these exploits should be taken seriously.

It is a common belief that an iPhone cannot be infected with malware, but this is not entirely true. While iPhones are rarely infected with malware, attackers can still take advantage of zero-day vulnerabilities and zero-click exploits to infect a user's device. However, such attacks are typically costly and difficult to carry out due to the high level of sophistication required.

Follow AppleInsider on Google News.

Leave a Reply