IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Everything you need to know about the Trident iPhone exploit

A new zero-day exploit is doing some pretty nasty things to iPhones

iphone SE

Last night the story broke that a piece of commercially-produced malware had been discovered which would allow someone to remotely take over an iPhone. The malware, dubbed Trident, used three previously undiscovered vulnerabilities in iOS to gain access to the phone and install sophisticated spyware.

What does the iPhone Trident exploit do?

It allows malicious users to remotely jailbreak a phone and install software on it that's hidden from the phone's owner. The malware is triggered by someone visiting a web page - the phone's user doesn't need to agree to download anything. The spyware package allowed its masters to use the phone's camera and microphone to record anything at any time, as well as monitoring chat software such as WhatsApp.

How was the Trident malware discovered?

The malware appears to have been specifically targeted at Ahmed Mansour, a human rights activist in the UAE. Mansour received text messages on his phone which claimed to link to details of human rights abuses. However, he became suspicious of the messages, and passed details on to Citizen Lab, who dissected the malware and linked it to an Israeli company which makes spyware for use by governments.

Who made the Trident malware?

Can the Trident malware affect me?

In theory, yes. In practice, this kind of targeted malware attack is almost always designed to focus on specific users by the government responsible. They also tend to want to keep the malware they use close to their chests because it's a costly piece of software which (ironically) they don't want to get into "the wrong" hands.

It's already been patched

If you're on iOS 9, hit software update and download iOS 9.3.5. This patches the exploits used by the NSO malware, as well as throwing in a few other security fixes into the mix.

Isn't this all pretty shady?

Yes it is. Add together shadowy companies making malware and governments targeting human rights activists for surveillance by hacking and you have something that sounds like it's out of a pacy cyberwar novel. Sadly, it looks like it's not fiction.

Featured Resources

The state of Salesforce: Future of business

Three articles that look forward into the changing state of Salesforce and the future of business

Free Download

The mighty struggle to migrate SAP to the cloud may be over

A simplified and unified approach to delivering Enterprise Transformation in the cloud

Free Download

The business value of the transformative mainframe

Modernising on the mainframe

Free Download

The Total Economic Impact™ Of IBM FlashSystem

Cost savings and business benefits enabled by FlashSystem

Free Download

Recommended

Best business smartphones 2022: The top handsets from Apple, Samsung, Google and more
Mobile

Best business smartphones 2022: The top handsets from Apple, Samsung, Google and more

23 Jun 2022
Hackers could use new Wslink malware in highly targeted cyber attacks
malware

Hackers could use new Wslink malware in highly targeted cyber attacks

1 Nov 2021
FBI raids Chinese POS business following cyber attack claims
malware

FBI raids Chinese POS business following cyber attack claims

27 Oct 2021
Malware developers create malformed code signatures to avoid detection
malware

Malware developers create malformed code signatures to avoid detection

24 Sep 2021

Most Popular

Cyber attack on software supplier causes "major outage" across the NHS
cyber attacks

Cyber attack on software supplier causes "major outage" across the NHS

8 Aug 2022
Why convenience is the biggest threat to your security
Sponsored

Why convenience is the biggest threat to your security

8 Aug 2022
How to boot Windows 11 in Safe Mode
Microsoft Windows

How to boot Windows 11 in Safe Mode

29 Jul 2022