Application of messages on the iPhone
ARRE iPhone Crash Linked to An Imessage Image Handling and Sharing Bug May Have Been The First Sign of A The target attack of a spy program, according to new judicial evidence and Mdash; But Apple is skeptical. The recently opened IMessage error in iOS, now corrected, perhaps revealed some iPhone users for attempts to silent observation. The disadvantage found in the Iverify security area influenced how the iPhone processed the nickname updates in the Message Appendix. Security researchers say that they found signs of possible operation on journalists, government officials and technical leaders. Apple, however, strongly denies that the error was used maliciously. The vulnerability, which the researchers called the “nickname”, was quietly corrected in iOS 18.3.
which was associated with the vulnerability of pseudonym and photo. This parameter allows users to send their preferred name, the image of the profile and wallpaper in the exchange of others.
According to Iverify, the drawback of how iOS processes these updates, nicknamed, allowed remotely the failures of the message application. Attackers can send a specially temporary series of changes in the nickname by causing a memory error in the system process called Imagent.
This type of disadvantages can be potentially used as a starting point for a more serious attack. The interaction was not required from the user.
partially decoded an accident from iOS 17.6.1, similar to other figurative issues. Image loan: iverify
That's why this type of vulnerability is called zero click. The only thing a potential attacker is needed is the target phone number and ID Apple.
proof of possible targeting
In the period from April 2024 to January 2025, it analyzed logic with accidents of almost 50,000 iOS. The type of malfunction associated with the nickname error was extremely rare.
it appeared by less than 0.002 percent of the studied devices, and only on phones used by people with increased risk profiles.
One senior official of the European Union survived an accident agreed with vulnerability and received a notice of threat from Apple about a month. Another device showed signs of file removal only 20 seconds after the failure.
Iverify researchers say that this model resembles what was observed in the previous attacks of spy programs. The team did not find malicious programs or implants. They say that they have moderate confidence that the mistake could be used as part of the larger chain of exploits.
Apple reacts with skepticism
Apple does not agree with the conclusions of Iverify. In the statement for Axios, Ivan Krstich, the head of Apple Security Engineering, said that the company decisively disagree with the assertion that it was a target attack. Apple believes that the failure came from the usual program error, which was fixed in iOS 18.3.
KRSTIC added that Apple did not see the trust of evidence that the error was operated in attacks in the real world. He also said that Iverify did not provide technical evidence that Spyware was installed.
Irdated data on failures from the message system on iOS 17.7. Image loan: Iverify
This is a significant difference in interpretation. The Iverify company relies on the magazines of failures and device activity templates. Apple claims that these conclusions are not enough to support the idea of a real attack.
Even without confirmed malicious software, the nickname report shows how powerful messaging functions can create new risks. It also emphasizes the problem of protecting users from invisible attacks that do not require interaction.
Apple Imessage already uses advanced security functions, such as Blastdoor, for the income screen. But this report shows that certain attackers continue to find ways to equip this protection.
For users, removal is simple. Keep your device updated, be careful with unknown messages and consider additional protection if you work in a confidential field.
how to stay safe
to reduce the risk of vulnerability, such as nickname, the most important step is to update your renewal iPhone. Always install iOS updates as soon as they become affordable.
You can also enable automatic updates in the settings in general and the software update to make sure that you are left protected without the need to remember.
If you work at high risk, such as journalism, government, activism or cybersecurity, consider the possibility of turning on the blocking regime. The setting limits certain messages and web functions to help protect targeted attacks.
it is also advisable not to interact with suspicious messages, even if they seem harmless or from unknown senders.
To get additional awareness, check the official Apple updates page. You do not need to panic, but staying relevant with software updates is the best way to protect your iPhone from silent threats such as this.