Visiting them was supposedly enough to compromise a device.
A small collection of hacked websites targeted iPhones using zero-day attacks for at least a couple of years, Google’s Project Zero team has revealed in a newly published report. The websites don’t even need a user’s input to infiltrate a device: just visiting them is enough to compromise an iPhone. In the case of a successful attack, an implant makes its way to the victim’s device to steal sensitive data like photos and iMessages, as well as to update the attackers on its real-time GPS location.
Motherboard notes that the implant can also infiltrate a user’s keychain and all the passwords in it, as well as the databases for other end-to-end encrypted messaging apps like Telegram and WhatsApp. The Project Zero team discovered a total of fourteen vulnerabilities affecting iPhones running on iOS 10 up to iOS 12.1.2.
A zero day exploit makes use of a vulnerability not known to the software/hardware-maker beforehand, so users have no means to be protected from attacks. The good news is that the malware the websites use disappears whenever an infected iPhone gets rebooted. Google highlighted the issues with Apple on February 1st, prompting a bunch of hotfixes in the iOS 12.1.4 update released on February 7th.
Update: We clarified the iOS versions affected and the version that rolled out with a fix.