Get all your news in one place.
100’s of premium titles.
One app.
Start reading
TechRadar
TechRadar
Sead Fadilpašić

WhatsApp security warning - zero-click bug hits Apple users with spyware, so update now

WhatsApp.
  • Hackers have been targeting WhatsApp users on iOS and Mac
  • The threat actors abused a new bug which enabled zero-click attacks
  • Meta apparently sent less than 200 cyberattack warning notifications

WhatsApp has patched a high-severity vulnerability in its iOS and Mac applications which was apparently used in zero-click attacks against a handful of high-profile individuals.

In a security advisory, the company said it fixed CVE-2025-55177, an “incomplete authorization of linked device synchronization messages in WhatsApp” bug which, “could have allowed an unrelated user to trigger processing of content from an arbitrary URL on a target’s device.”

This bug was allegedly chained with a separate flaw, fixed earlier in August, tracked as CVE-2025-43300. These two were used “in a sophisticated attack against specific targeted users.”

Targeting high-profile individuals

Head of the Amnesty International’s Security Lab, Donncha Ó Cearbhaill, said on X that an “advanced spyware campaign” has been active since the end of May 2025, targeting Apple users with a “zero-click” attack that requires no interaction from the victim, TechCrunch reported.

The same source posted a copy of the data breach notification letter WhatsApp sent to affected individuals, in which it was said that their device, and the data it contains (including messages) were most likely compromised.

At press time, no threat actors assumed responsibility for this attack, and the researchers were not yet able to attribute it to anyone.

However, Meta spokesperson Margarita Franklin told TechCrunch the company had sent out “less than 200” notifications.

This could mean the attacks were highly targeted, possibly to maximize its efficiency and not draw too much attention from the cybersecurity community.

Zero-click attacks are few and far apart, and when they do pop up, they are usually abused by nation-states in espionage campaigns against politicians and diplomats, journalists, dissidents, government agents, military and defense personnel, and similar.

In late April 2025, researchers found Apple’s AirPlay Protocol and AirPlay Software Development Kit (SDK) carrying numerous vulnerabilities that could have been abused to run remote code execution (RCE) attacks, man-in-the-middle (MitM) attacks, or denial of service (DoS) attacks. Some of these vulnerabilities could have been used in zero-click attacks, too.

Via TechCrunch

You might also like

Sign up to read this article
Read news from 100’s of titles, curated specifically for you.
Already a member? Sign in here
Related Stories
Top stories on inkl right now
One subscription that gives you access to news from hundreds of sites
Already a member? Sign in here
Our Picks
Fourteen days free
Download the app
One app. One membership.
100+ trusted global sources.