On August 29th 2019, the British security researcher Ian Beer (@i41nbeer) from Project Zero at Google published multiple blog posts about a series of iOS exploits. According to their findings, those exploits have been used to completely take over iOS devices. This article provides focused answers to eleven questions about this series of events.
What is the overall impact of this attack?
- you used an iOS device (iPhone, iPad, …) in the last two years and
- visited a certain hacked site (more on that later)
your device could have potentially been overtaken by the attacker.
Complete access to all your data, including
- All messages (even encrypted ones, even from WhatsApp and iMessage – of course also unencrypted texts)
- Passwords (iOS Keychain)
- Third-Party Application Data (Facebook, Telegram, Skype, …)
- Locations (via GPS)