Smartphone screen flashing a Device Under Threat alert with a fading cityscape at sunset and scattered cables around

Apple & Google Patch Spyware Exploits After High-Profile Attacks

At a Glance

  • Hundreds of iPhone and Android users received a spyware threat notification in December.
  • Apple and Google patched the same exploits that were used to install Predator spyware.
  • Spyware can infiltrate phones without any user action, exposing every message, keystroke, and screenshot.

Why it matters: If a device is compromised, attackers can read encrypted chats, steal credentials, and monitor your every move-especially dangerous for activists, journalists, and high-profile leaders.

In December, a wave of spyware alerts hit smartphones, followed by patches from Apple and Google that closed the very exploits used to plant the Predator malware. The threat has already reached former Amazon CEO Jeff Bezos and the wife of the murdered Saudi dissident Jamal Khashoggi, showing that even the most powerful users are not immune.

How Spyware Works

The Predator malware is installed through a chain of zero-click attacks, meaning a phone can become infected without any user interaction.

If a device is infected, attackers can read messages, take screenshots, monitor notifications, and access banking apps.

The malware also has full system access, allowing it to exfiltrate emails, texts, and cloud credentials.

Pieter Arntz, a senior malware researcher at Malwarebytes, stated:

> “If the malware has infected your smartphone, adversaries can read messages, observe keystrokes, take screenshots, monitor notifications, and access banking apps.”

Rocky Cole, cofounder of iVerify, added:

> “With full system access, spyware can exfiltrate data such as emails and texts, send messages, steal credentials, and log in to cloud systems.”

Signs You Might Be Targeted

Spyware leaves subtle clues that can be hard to spot.

Overheating, slowed performance, or unexpected camera or mic activation are common warning signs.

An official threat notification from Apple, Meta, or Google is a clear indicator of a targeted attack.

Rebecca White, Amnesty International researcher, said:

> “In this way, spyware can be used as a tool of repression-to silence people speaking truth to power.”

Defending Your Device

Apple’s Lockdown Mode blocks most message attachments and FaceTime calls, and Memory Integrity Enforcement protects against memory corruption exploits.

Google’s Advanced Protection for Android includes intrusion logging, USB protection, and the option to disable auto-reconnect to insecure networks.

Both systems rely on keeping software up to date and avoiding side-loading or suspicious links.

Ivan Krstić, Apple security VP, noted:

Smartphone screen shows Apple threat warning with camera app crossed out and faint grid with drifting icons

> “Apple has continued to develop new methods for combating spyware, including Lockdown Mode and Memory Integrity Enforcement.”

Richard LaTulip, Recorded Future CISO, highlighted:

> “Nation-state adversaries are moving toward more covert, persistent, and device-level compromises.”

Date Event
Dec 2023 Google issued threat notification about Predator spyware
Dec 2023 Apple and Google patched the exploited vulnerabilities
Dec 2023 CISA warned about active use of commercial spyware

Key Takeaways

  • Spyware can infect devices without any user action, exposing all data.
  • Apple and Google patches closed the exact exploits used to plant Predator.
  • Lockdown Mode and Advanced Protection offer the strongest defenses, but staying vigilant and updating software is essential.

The growing reach of spyware means that anyone with a smartphone could become a target-protecting your device is now more important than ever.

Author

  • Isaac Thornwell covers transportation and urban mobility for News of Austin, reporting on how infrastructure and planning decisions shape the city’s growth. A Texas A&M urban planning graduate, he’s known for translating complex transit data and policy into clear, impactful stories for Austin residents.

Comments

No comments yet. Why don’t you start the discussion?

Leave a Reply

Your email address will not be published. Required fields are marked *