• Menu
  • Skip to right header navigation
  • Skip to main content
  • Skip to primary sidebar

DigiBanker

Bringing you cutting-edge new technologies and disruptive financial innovations.

  • Home
  • Pricing
  • Features
    • Overview Of Features
    • Search
    • Favorites
  • Share!
  • Log In
  • Home
  • Pricing
  • Features
    • Overview Of Features
    • Search
    • Favorites
  • Share!
  • Log In

American iPhones maybe targeted in spyware attacks with a pattern of deleting potential evidence, mirroring techniques where attackers ‘clean up’ after themselves

June 9, 2025 //  by Finnovate

A new report from the team at iVerify warns that a “previously unknown” vulnerability in iOS maybe enabled a highly targeted attack on iPhones in the U.S. as well as Europe. This flaw was not in the core messaging architecture itself, but in its nickname feature. “Any increase in the size of a codebase is going to introduce attack opportunities,” iVerify told. And that’s the case here. When a user updates their profile, “nickname, photo, or wallpaper,” this triggers “a ‘Nickname Update’ on a recipient’s device.” Trivial though it might seem, that nickname update process is a data transmission from one device to another, it’s implicitly trusted data and it’s within the secure enclave. “This vulnerability was present in iOS versions up to 18.1.1 and fixed in iOS 18.3.1.” While there’s no doubting the flaw and the fix, there is no concrete proof it was exploited in the wild. “We analyzed crash data from nearly 50,000 devices,” iVerify says, “and found that the imagent crashes related to Nickname Updates are exceedingly rare, comprising less than 0.001% of all crash logs collected.” But those rare instances appeared only on “devices belonging to individuals likely to be targeted by sophisticated threat actors.” iVerify reports that forensic examination of one affected device “provided evidence suggesting exploitation: several directories related to SMS attachments and message metadata were modified and then emptied just 20 seconds after the imagent crash occurred. This pattern of deleting potential evidence mirrors techniques observed in confirmed spyware attacks where attackers ‘clean up’ after themselves.”

Read Article

Category: Cybersecurity, Innovation Topics

Previous Post: « Plaid and Cross River partner to launch Request for Payment featuring instant confirmation and final settlement; seamless bank authorization via Plaid Link; built-in account verification, balance checks and bank eligibility; and a single integration to intelligently route payments across available rails
Next Post: Bigeye introduces the first platform for governing AI data usage for enforceable policies that control how AI agents access and use high-quality, sensitive, and certified data, also covering observability and enforcement »

Copyright © 2025 Finnovate Research · All Rights Reserved · Privacy Policy
Finnovate Research · Knyvett House · Watermans Business Park · The Causeway Staines · TW18 3BA · United Kingdom · About · Contact Us · Tel: +44-20-3070-0188

We use cookies to provide the best website experience for you. If you continue to use this site we will assume that you are happy with it.