Skip to main content

Google says hackers have been able to access your iPhone data for years

Image used with permission by copyright holder

iPhones from iOS 10 to recent versions of iOS 12 were open to having messages, images, and location data stolen by hackers through a web-based exploit, according to Google’s external security & research blog, Google Project Zero.

Recommended Videos

As part of a 30-month-long operation, researchers were able to take advantage of an exploit in Apple’s default web browser, Safari, to load malware onto devices. Simply landing on an infected webpage was all that was needed to infect an iOS device, and once deployed, the malware allowed hackers to access sensitive data from across the device. According to the extensive blog post, the earliest version of iOS infected by this exploit was iOS 10.0.1, meaning the security hole was likely in existence from at least September 2016.

Once the malware was loaded, the hacker had access to a wide variety of data from the infected device. The final post of the blog contains minute details of the data that could be siphoned from various apps. This included messages from WhatsApp, Telegram, and other otherwise secure messaging apps, accurate location data, and contact details. The malware could even take copies of images and emails received on the device, all without the user’s knowledge.

The malware would send an update every 60 seconds, ensuring the hacker always had an up-to-date version of all the stolen data. On the plus side, the hack could be cleared out by restarting a device, as the malware would not be stored in the local memory. As another side effect, this constant updating would also be likely to take a severe toll on the device’s battery life.

Thankfully for iOS users, Google reported this exploit to Apple on February 1 and it was apparently fixed via a security patch on February 7. However, that probably only accounts for devices on the latest version of iOS, iOS 12. While unverified, users of iPhones running older versions of iOS should be aware that this exploit potentially still exists. According to Apple, that only accounts for 12% of all active iOS devices, but it’s still a hefty chunk of users.

If you’re not sure what version of iOS you’re running, head to Settings > General > About, and see which version of iOS is listed under Software Version.

While always good advice, be careful of the websites you visit and avoid any clicking on any suspicious links. If you suspect you have been infected, restart your device to hopefully clear the malware. However, just because the malware has been cleared doesn’t mean you’re out of the woods yet. According to Google’s Ian Beer, “given the breadth of information stolen, the attackers may nevertheless be able to maintain persistent access to various accounts and services by using the stolen authentication tokens from the keychain, even after they lose access to the device”.

With that in mind, the only real solution to the exploit may well be upgrading to a new iPhone. The latest versions of iOS 12 (soon to be iOS 13) have been immunized against the exploit, so you’ll be able to surf in peace.

We have reached out to Apple for comment and will update when we hear back.

Mark Jansen
Mobile Evergreen Editor
Mark Jansen is an avid follower of everything that beeps, bloops, or makes pretty lights. He has a degree in Ancient &…
Latest iPhone Fold rumor tells us a little more about the camera
Semi-open state of a foldable iPhone concept

Foldable phones have been around for over five years now and there are several options available. It's not just Samsung and Google in the folding space, but Motorola, Huawei, Oppo, OnePlus and Honor too. There is one company notably missing however, and that's Apple. 

The company has long been rumoured to be working on a folding iPhone, and there's talk of a larger folding device too. Both are speculated to enter mass production in late 2026 with a launch then happening towards the end of next year or early 2027. 

Read more
Android phones get new security feature that iPhone owners already have
The Google Pixel 9a on a table showing the screen.

Google is taking a page out of Apple's playbook by launching a new security feature that makes Android phones automatically restart after a few days of inactivity.

The new auto-restart feature (or auto-reboot, if you want to call it that) was patched into the latest Google Play services update, which was released on Monday. The release notes say that the update forces your Google Pixel 9, Samsung Galaxy S25, or other Android phone to restart itself "if locked for [three] consecutive days," which means you need to enter your PIN code if you want to unlock it after not using it for that period of time. It resembles the Inactivity Reboot feature on iOS 18.1, only iPhones would restart themselves after four days.

Read more
You could be folding your iPad as soon as next year
A person holding the 13-inch iPad Air (2025).

The iPad Fold, as it's being touted, could arrive as soon as next year.

A new report suggests that the first folding iPad could be on track to land in 2026.

Read more