Stop What You’re Doing and Update Your iPhone: Spyware Flaw Found 'In the Wild'

Will Smith
5 Min Read

Apple pushed a critical security update to over a billion users on Wednesday, patching two zero-day vulnerabilities that were already being exploited in the wild. The company described the attacks as “extremely sophisticated”—a designation that, in the nuanced language of cybersecurity, often implies state-sponsored actors rather than common cybercriminals.

The update brings iPhones and iPads to version 26.2. It arrives with a rare sense of urgency: hackers didn’t just find these flaws; they were actively using them to target specific individuals before Apple could intervene.

People should treat this as a ‘today’ problem, not a ‘someday’ problem. Any device that browses the web is potentially in play.

That warning comes from a security director at a major US enterprise, who spoke on condition of anonymity to discuss internal risk assessments. While the attacks appear targeted, the vulnerability exists in the software architecture used by almost every modern Apple mobile device.

The WebKit Weakness

The vulnerabilities are located in WebKit, the browser engine that powers Safari and—crucially—underpins every third-party browser allowed on iOS. If you use Chrome or Firefox on an iPhone, you are still relying on WebKit.

The first flaw, tracked as CVE-2025-43529, is a “use-after-free” vulnerability. It allows malicious code to execute simply because the user visited a compromised website. The second, CVE-2025-14174, involves memory corruption.

When chained together, these bugs allow an attacker to bypass iOS’s notorious “walled garden” defenses. One opens the door; the other disables the alarm.

Think of it as a lock and a deadbolt. One bug opens the lock, the other helps force the deadbolt. Together, the door is wide open.

According to a researcher at a New York-based incident response firm, this combination allows intruders to escalate privileges and take control of the device without the user ever tapping “allow.”

Fingerprints of Espionage

The attribution of the discovery offers a clue to the severity of the threat. The flaws were flagged by Google’s Threat Analysis Group (TAG), a specialized unit known for tracking government-backed hacking and commercial spyware vendors.

While Apple has not named a specific perpetrator, the involvement of TAG and the “targeted” nature of the attacks suggests the tools were likely deployed against high-value targets—journalists, diplomats, or dissidents—rather than the general public.

When TAG is involved and Apple is using phrases like ‘extremely sophisticated,’ you’re not dealing with random ransomware gangs. You’re probably looking at well-funded, possibly state-linked operators.

This assessment comes from a former US government cyber official now advising technology investors. Historically, similar exploits have been traced back to commercial spyware suites used by nation-states to monitor political opposition.

The Silent Compromise

The attack vector is unnervingly simple. A target receives a link via text, email, or a messaging app. Clicking it triggers the WebKit exploit instantly. There are no flashing red lights; the compromise happens silently in the background.

Once inside, the attacker can reportedly install spyware capable of:

  • Capturing keystrokes and passwords
  • Activating cameras and microphones
  • Reading encrypted messages
  • Tracking real-time location

The scary part for us is that from the user’s point of view, nothing looks wrong. No pop-up, no crash, just business as usual.

A security lead at a large European bank noted that this invisibility is precisely what makes zero-day chains so valuable on the gray market, where such exploits can sell for millions of dollars.

Who is at Risk?

While the active attacks were likely limited to a small number of high-profile individuals, the vulnerability affects a vast swath of hardware. The patch covers:

  • iPhone 11 and later
  • iPad Pro (all recent models)
  • iPad Air (3rd generation and later)
  • Recent base model iPads and iPad minis

Security analysts argue that while average users were not the primary targets, the release of the patch creates a paradox: it fixes the hole, but it also reveals the location of the vulnerability to the broader criminal community. Reverse engineers will inevitably dissect the update to recreate the exploit.

“Every time we think we’ve raised the drawbridge, someone finds a new tunnel,” observed a European digital rights advocate. “By the time the patch lands, someone’s life may already have been changed.”

Users are advised to navigate to Settings > General > Software Update immediately.

Share This Article
Follow:
At AwazLive, I focus on translating complex ideas into compelling stories that help audiences understand where technology is heading next. Always exploring, always curious, always chasing the next big shift in the tech world.