London Daily

Focus on the big picture.
Friday, Jun 20, 2025

Google engineer demonstrate how he could get full control and copy all data from 25 iPhones without touching them

iPhone security? Hmmm... In this demo I remotely trigger an unauthenticated kernel memory corruption vulnerability which causes all iOS devices in radio-proximity to reboot, with no user interaction. Over the next 30'000 words I'll cover the entire process to go from this basic demo to successfully exploiting this vulnerability in order to run arbitrary code on any nearby iOS device and steal all the user data

One of the geniuses working for Google on Project Zero wrote on his blogpost and on his YouTube videos:

Introduction
Quoting @halvarflake's Offensivecon keynote from February 2020:

"Exploits are the closest thing to "magic spells" we experience in the real world: Construct the right incantation, gain remote control over device."

For 6 months of 2020, while locked down in the corner of my bedroom surrounded by my lovely, screaming children, I've been working on a magic spell of my own. No, sadly not an incantation to convince the kids to sleep in until 9am every morning, but instead a wormable radio-proximity exploit which allows me to gain complete control over any iPhone in my vicinity. View all the photos, read all the email, copy all the private messages and monitor everything which happens on there in real-time.

The takeaway from this project should not be: no one will spend six months of their life just to hack my phone, I'm fine.

Instead, it should be: one person, working alone in their bedroom, was able to build a capability which would allow them to seriously compromise iPhone users they'd come into close contact with.

Imagine the sense of power an attacker with such a capability must feel. As we all pour more and more of our souls into these devices, an attacker can gain a treasure trove of information on an unsuspecting target.

What's more, with directional antennas, higher transmission powers and sensitive receivers the range of such attacks can be considerable.

I have no evidence that these issues were exploited in the wild; I found them myself through manual reverse engineering. But we do know that exploit vendors seemed to take notice of these fixes. For example, take this tweet from Mark Dowd, the co-founder of Azimuth Security, an Australian "market-leading information security business":

Watch the videos and read his full post here.

Newsletter

Related Articles

0:00
0:00
Close
16 Billion Login Credentials Leaked in Unprecedented Cybersecurity Breach
Senate hearing on who was 'really running' Biden White House kicks off
Iranian Military Officers Reportedly Seek Contact with Reza Pahlavi, Signal Intent to Defect
FBI and Senate Investigate Allegations of Chinese Plot to Influence the 2020 Election in Biden’s Favor Using Fake U.S. Driver’s Licenses
Vietnam Emerges as Luxury Yacht Destination for Ultra‑Rich
Plans to Sell Dutch Embassy in Bangkok Face Local Opposition
China's Iranian Oil Imports Face Disruption Amid Escalating Middle East Tensions
Trump's $5 Million 'Trump Card' Visa Program Draws Nearly 70,000 Applicants
DGCA Finds No Major Safety Concerns in Air India's Boeing 787 Fleet
Airlines Reroute Flights Amid Expanding Middle East Conflict Zones
Elon Musk's xAI Seeks $9.3 Billion in Funding Amid AI Expansion
Trump Demands Iran's Unconditional Surrender Amid Escalating Conflict
Israeli Airstrike Targets Iranian State TV in Central Tehran
President Trump is leaving the G7 summit early and has ordered the National Security Council to the Situation Room
Taiwan Imposes Export Ban on Chips to Huawei and SMIC
Israel has just announced plans to strike Tehran again, and in response, Trump has urged people to evacuate
Netanyahu Signals Potential Regime Change in Iran
Juncker Criticizes EU Inaction on Trump Tariffs
EU Proposes Ban on New Russian Gas Contracts
Analysts Warn Iran May Resort to Unconventional Warfare
Iranian Regime Faces Existential Threat Amid Conflict
Energy Infrastructure Becomes War Zone in Middle East
UK Home Secretary Apologizes Over Child Grooming Failures
Trump Organization Launches 5G Mobile Network and Golden Handset
Towcester Hosts 2025 English Greyhound Derby Amid Industry Scrutiny
Gary Oldman and David Beckham Knighted in King's Birthday Honours
Over 30,000 Lightning Strikes Recorded Across UK During Overnight Storms
Princess of Wales Returns to Public Duties at Trooping the Colour
Red Arrows Use Sustainable Fuel in Historic Trooping the Colour Flypast
Former Welsh First Minister Addresses Unionist Concerns Over Irish Language
Iran Signals Openness to Nuclear Negotiations Amid Ongoing Regional Tensions
France Bars Israeli Arms Companies from Paris Defense Expo
King Charles Leads Tribute to Air India Crash Victims at Trooping the Colour
Jack Pitchford Embarks on 200-Mile Walk to Support Stem Cell Charity
Surrey Hikers Take on Challenge of Climbing 11 Peaks in a Single Day
UK Deploys RAF Jets to Middle East Amid Israel-Iran Tensions
Two Skydivers Die in 'Tragic Accident' at Devon Airfield
Sainsbury's and Morrisons Accused of Displaying Prohibited Tobacco Ads
UK Launches National Inquiry into Grooming Gangs
Families Seek Closure After Air India Crash
Gold Emerges as Global Safe Haven Amid Uncertainty
Trump Reports $57 Million Earnings from Crypto Venture
Trump's Military Parade Sparks Concerns Over Authoritarianism
Nationwide 'No Kings' Protests Challenge Trump's Leadership
UK Deploys Jets to Middle East Amid Rising Tensions
Trump's Anti-War Stance Tested Amid Israel-Iran Conflict
Germany Holds First Veterans Celebration Since WWII
U.S. Health Secretary Dismisses CDC Vaccine Advisory Committee
Minnesota Lawmaker Melissa Hortman and Husband Killed in Targeted Attack; Senator John Hoffman and Wife Injured
Exiled Iranian Prince Reza Pahlavi Urges Overthrow of Khamenei Regime
×