Get all your news in one place.
100’s of premium titles.
One app.
Start reading
TechRadar
TechRadar
Sead Fadilpašić

Apple issues customer warning after four spyware campaigns discovered targeting devices

New Siri features infused with Apple Intelligence being demonstrated at Apple's Worldwide Developers Conference (WWDC) in June 2024.
  • Apple issued four waves of alerts in 2025 warning users of spyware attacks targeting high-profile individuals
  • CERT-FR confirmed the use of advanced tools like Pegasus and Predator, exploiting zero-day and zero-click flaws
  • Apple notified compromised users via device and iCloud, while patching at least seven critical vulnerabilities

From early March 2025 Apple has, on four separate occasions, alerted its users about an ongoing spyware attack.

The attacks are sophisticated and dangerous, often targeting individuals of specific interests to different nation-states and governments.

This is according to the French National Computer Emergency Response Team (CERT-FR). In a new security advisory, the agency said threat actors are using advanced spyware, such as Pegasus, Predator, Graphite, or Triangulation, which is “particularly sophisticated and difficult to detect”.

Four waves of notifications

To deploy the spyware, the attackers would often abuse zero-day vulnerabilities, or even zero-click flaws (bugs that require no interaction from the victim whatsoever which are, as such, extremely dangerous).

The targets are high-profile individuals: journalists, lawyers, activists, politicians, senior civil servants, members of management committees of strategic sectors, and similar.

Apple has been notifying the targets directly on their devices, as well as through a notification in their iCloud account. CERT-FR also said that Apple’s only been notifying accounts that were most likely already compromised: “Receiving a notification means that at least one of the devices linked to the iCloud account has been targeted and would potentially be compromised,” the announcement reads.

“The time between the attempted compromise and the receipt of the notification is several months but remains variable.”

The four waves of alerts happened on March 5, April 29, June 25, and September 3.

CERT-FR did not discuss which flaws the threat actors were targeting, but we do know that Apple patched at least seven zero-day flaws this year:

  • CVE-2025-24085 (use-after-free bug)
  • CVE-2025-24200 (privilege escalation)
  • CVE-2025-24201 (privilege escalation)
  • CVE-2025-31200 (memory corruption)
  • CVE-2025-31201 (local privilege escalation)
  • CVE-2025-43200 (logic flaw)
  • CVE-2025-4330 (ImageIO flaw)

One of the spyware mentioned in the report is Pegasus, designed by an Israeli cybersecurity company called NGO Group. It was blacklisted by the US in early November 2021 for actions contrary to US national security and foreign policy interests.

Via BleepingComputer

You might also like

Sign up to read this article
Read news from 100’s of titles, curated specifically for you.
Already a member? Sign in here
Related Stories
Top stories on inkl right now
One subscription that gives you access to news from hundreds of sites
Already a member? Sign in here
Our Picks
Fourteen days free
Download the app
One app. One membership.
100+ trusted global sources.