logo
High-profile Americans' iPhones may have been targeted in hacking campaign, says cybersecurity firm for Harris-Walz

High-profile Americans' iPhones may have been targeted in hacking campaign, says cybersecurity firm for Harris-Walz

NBC News05-06-2025
One of the few companies to specialize in iPhone cybersecurity said in a report Thursday that it has uncovered evidence in a handful of mobile phones of a potentially groundbreaking hacking campaign targeting five high-profile Americans in media, artificial intelligence and politics, including former members of Kamala Harris' presidential campaign.
The preliminary research, conducted by the cybersecurity firm iVerify, includes a significant amount of circumstantial evidence,' iVerify CEO Rocky Cole said. Apple, the maker of the iPhone, refuted the findings.
But Cole stood by the report's significance for research purposes. Apple's reputation is sterling among security professionals, and if a hack occurred, it would be a significant development in the cybersecurity industry.
IVerify has not identified who may be behind the potential hacking operation, but believes the targets and technical sophistication suggest a capable spy agency may have been involved.
Two people familiar with the investigation told NBC News that former members of the Harris-Walz campaign were some of the people iVerify believes were targeted. It's not clear what initially set off the investigation.
IVerify said that in addition to the Americans who were targeted, a European government official's iPhone had indications of remote tampering. It appears that last year, a hacker remotely and secretly installed a type of invasive, malicious program known as spyware to snoop on those users without their knowledge, iVerify said. Out of nearly 50,000 phones that iVerify analyzed, it found only six — all belonging to high-profile people who would be potential targets for an espionage campaign — that showed evidence of exploitation.
Apple disputed iVerify's conclusion that its evidence is a strong indication that iPhones were hacked.
'We've thoroughly analyzed the information provided by iVerify, and strongly disagree with the claims of a targeted attack against our users. Based on field data from our devices, this report points to a conventional software bug that we identified and fixed in iOS 18.3,' Ivan Krstić, the head of Apple Security Engineering and Architecture, said in an emailed statement.
Apple is 'not currently aware of any credible indication that the bug points to an exploitation attempt or active attack,' Krstić said.
IVerify CEO Rocky Cole responded in a statement: 'In light of the recent public conversation around mobile security, there is ample evidence in the report worth sharing with the research community. We've never claimed there is a smoking gun here, only a significant amount of circumstantial evidence.'
iVerify's report makes it clear it did not directly catch malicious software that took over phones. Instead, its researchers found evidence that it had been installed, then deleted. The phones suspected of being hacked displayed suspicious activity in crash logs, the records a computer or a smartphone automatically writes when the operating system encounters an error or a program fails. That indicates tampering, the company said.
'We identified exceedingly rare crash logs that appeared exclusively on devices belonging to high-risk individuals including government officials, political campaign staff, journalists, and tech executives,' the report says. 'At least one affected European Union government official received an Apple Threat Notification approximately thirty days after we observed this crash on their device, and forensic examination of another device revealed signs of successful exploitation.'
Andrew Hoog, a co-founder of the mobile phone security company NowSecure, told NBC News that he found iVerify's 'analysis and conclusions credible and consistent with what we've observed over nearly a decade of mobile zero-click attacks.'
If a spyware campaign has been taking over high-profile Americans' phones, it would be a major escalation in the back-and-forth between cyberspies and the security engineers who try to stop them. The iPhone's cybersecurity is widely revered, and cybersecurity experts largely view iPhones as some of the most secure devices that are commercially available.
Apple routinely updates its operating system to fix flaws that hackers use to break in. But it has also designed the iPhone operating system to share very little information with cybersecurity researchers, far less than most other operating systems.
iVerify's claim comes in the context of other allegations that cyberspies snooped on the 2024 presidential campaigns, including the United States' accusing China of listening to both parties' presidential campaigns' phone calls and Iran of hacking Trump campaign emails and sending stolen information to Biden campaign officials. The Biden administration's Justice Department charged three Iranians in connection with the operation in September.
Researchers have for years tracked governments' use of spyware to spy on journalists and activists in other countries. Politicians in France and Spain have been targeted by spyware, prompting national scandals. IVerify's report is the first major public claim of spyware's successfully breaking into iPhones tied to American phone numbers and high-profile Americans.
There is precedent for cyberspies' targeting major political campaigns. Last year, Microsoft, Google and several federal agencies said Chinese intelligence had hacked several major telecommunications companies, including AT&T and Verizon, and used that access to specifically spy on both the Trump and Harris campaigns ' conversations.
The White House did not respond to a request for comment. The Trump campaign did not hire iVerify, so it does not have data from it to analyze. Sources who confirmed that members of the Harris-Waltz campaign were among those whom iVerify has investigated as targets of the campaign did not identify those people.
iVerify also discovered a potential way hackers could have gotten in: a vulnerability in iMessage, the chat app that comes preloaded in Apple phones, that appears to be a zero-click vulnerability, meaning a hacker could exploit it without the user's even knowing. Apple has since patched the vulnerability.
Spyware can give remote hackers remarkable insight into their victims' personal messages and accounts. While confirmed instances are rare, it is the only proven tactic for hackers to reliably bypass the major privacy protections available for commercial phones, like the encrypted messaging app Signal. A hacker who successfully deploys spyware on politicians' phones, for instance, could read all their Signal chats, track their browsing histories, listen to their phone calls and even turn the phones into covert listening devices to spy on conversations while they are in the targets' pockets.
By giving a hacker remote access to a phone, spyware goes beyond even the Salt Typhoon espionage campaign, in which the United States accused China last year of hacking AT&T and Verizon to intercept phone calls and text messages as they traveled from one person to another — including targeting the messages of both the Trump-Vance and Harris-Walz campaigns.
The most commonly identified spyware in such cases is designed by the Israeli company NSO Group, which is sanctioned by the United States and has long claimed its products cannot be used to hack phones with American numbers. An NSO Group spokesperson told NBC News it was not involved in the incidents iVerify's research identified.
American diplomats and embassy workers abroad have also been infected with NSO spyware, according to the Biden White House, but evidence that such technology had targeted a U.S. presidential campaign or other high-profile Americans in the United States has never been previously reported.
'I think it illustrates that mobile compromise is real, not academic or hypothetical, and it's happening here in the United States in a systematic way,' said Cole, iVerify's CEO. He declined to specify the identities of the five people whose phones exhibited signs of having been targeted with spyware, except to say that they are all Americans who work in politics, media and artificial intelligence and that all would be of interest to a foreign intelligence service.
The fact that sophisticated phone spyware is becoming the most reliable way to read a person's otherwise secure messages makes it an obvious tactic for spy agencies, despite its technical difficulty, said Patrick Arvidson, a National Security Agency veteran who worked on mobile phone security at the agency, who viewed iVerify's report before it was published.
'I think that you're going to see in the coming year, two years, three years, more and more of these kinds of mass-scale incidents,' he said.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

I was scammed out of hundreds by ‘Jennifer Aniston' who told me she loved me & needed cash for her ‘Apple subscriptions'
I was scammed out of hundreds by ‘Jennifer Aniston' who told me she loved me & needed cash for her ‘Apple subscriptions'

Scottish Sun

time3 hours ago

  • Scottish Sun

I was scammed out of hundreds by ‘Jennifer Aniston' who told me she loved me & needed cash for her ‘Apple subscriptions'

Click to share on X/Twitter (Opens in new window) Click to share on Facebook (Opens in new window) A MAN was cruelly scammed out of £200 after being sweet-talked by a fake Jennifer Aniston begging for cash for 'Apple subscriptions'. Paul Davis, 43, from Southampton, handed over the money after believing he was talking to the Friends star on Facebook. Sign up for Scottish Sun newsletter Sign up 7 Scam victim Paul Davis has revealed he lost hundreds of pounds Credit: Solent 7 Paul fell for a computer generated video of Jennifer Aniston and handed over £200 Credit: Solent 7 He believed he was talking to the Friends star Credit: Solent 7 Paul was sent what looked like Jennifer Aniston's driving licence, before she told him she 'loves him' and asked for money Credit: Solent Paul says he was targeted by an army of AI scammers pretending to be A-list stars - including the Friends legend herself - in a bizarre new wave of deepfake fraud. The unemployed Brit, who battles depression, revealed how he was bombarded with dozens of eerily convincing videos from bogus celebrity accounts. Some fraudulently posed as tech titans Mark Zuckerberg and Elon Musk. But it was a phoney Aniston who finally fooled him after sending what looked like her driving licence. The fraudster also told Paul she 'loved him' before asking for money. Paul said: 'I've had fake videos from Jennifer Aniston saying she loves me and asking for £200. I believed it – and I paid.' The cruel scam saw him send £200 worth of non-refundable Apple gift cards to the supposed Hollywood sweetheart. 'I got bitten,' he added. 'Once bitten, twice shy.' The shocking con is part of a terrifying rise in AI-powered scams, with crooks creating scarily real deepfake clips of celebs to trick unsuspecting victims out of their cash and private info. Paul says he's been relentlessly harassed for months, receiving fake messages every day claiming he's won everything from mega cash prizes to a flashy Range Rover. My mum's being scammed by an AI deepfake of 'Owen Wilson' who paid her £7 to 'prove' his identity - would you fall for it? One video even showed a fake Zuckerberg declaring: 'This is not a scam - believe me' while flashing a dodgy ID. Another sent him a bogus 'certificate from Facebook' claiming he'd scooped £500k and a luxury motor. 'They make it look so real,' Paul said. 'It's been going on for five months. I thought someone would get in trouble for this, but they seem to be having a laugh – and getting away with it.' Worryingly, Paul says he's not the only one falling victim. He revealed: 'Someone I know's lost over a grand in Apple gift cards to these scams." Now, struggling with his mental health and unable to work, Paul says the constant barrage of cons is taking its toll. Paul said: 'I can't keep taking that sort of hit. They're asking for bank details, credit card info - everything.' 7 Messages between Paul and the fake Jennifer Aniston Credit: Solent 7 He also received scam messages from someone posting of Tesla owner Elon Musk Credit: Solent 7 Facebook creator and tech whiz Mark Zuckerberg is also used by scammers Credit: Solent The 43-year-old says he is sharing his story in a bid to warn others and stop the scammers in their tracks. It comes after a scammer who conned a French woman out of nearly £700,000 by pretending to be Brad Pitt was unmasked in Nigeria. Interior designer Anne, 53, was scammed into funding a fake cancer treatment for the star after receiving AI-generated selfies and sweet-talking texts. The cruel romance con lasted over a year, costing Anne her fortune, her marriage, and her mental health. Eventually a crack team discovered the scammer's identity, his Nigerian base, and 34 other victims. Meanwhile, another woman put out a call for help after noticing her mum fall for an AI deepfake scam of Owen Wilson. The unnamed woman took to Reddit, revealing both she and her sister had failed to convince her mum that the man she was chatting to was not the real actor. She decided to share the AI deepfake video her mum had been sent by 'Owen Wilson' with the title 'Owen Wilson befriended my mother.'

Apple watch-style bracelets and spice wands - inside tech push to fix jails
Apple watch-style bracelets and spice wands - inside tech push to fix jails

Daily Mirror

time4 hours ago

  • Daily Mirror

Apple watch-style bracelets and spice wands - inside tech push to fix jails

Prisons Minister James Timpson is looking at a wide range of tech ideas, including special smell detectors to replace sniffer dogs and thermal sensors to be on suicide watch Digital wands that can detect drugs and biometric smartwatch-style bracelets could be used to reduce violence, addiction and other harms in jails or in the community. Prisons Minister James Timpson is exploring the use of technology as he battles to deal with an ongoing criminal justice crisis. He is looking at a wide range of radical tech ideas, including special smell detectors to replace sniffer dogs and thermal sensors to be on suicide watch in jail cells. ‌ Outside of prisons, facial recognition technology that can be integrated into CCTV cameras in nightclubs and pubs to catch criminals who are banned from the premises is being explored. It could also be used within ring doorbells where an offender is on house arrest to ensure they are at home or that bad actors do not visit them. ‌ On Tuesday seven top tech companies pitched their ideas in a Dragon's Den-style event in central London, which The Mirror attended. Among the pitches included 'smell detector' devices which use synthetic brain cells and AI to replicate the behaviour of a human nose. The sensor can be attached to airport-style security scanners or in areas in a jail to detect if drugs are present, not only to confiscate them but also to build up intelligence about illegal drug use within a prison. Elsewhere, one company was offering a 'spice wand' that can detect the drug with bright ultraviolet light. There is a major crisis in prisons in England and Wales related to synthetic cannabinoids - often referred to as 'spice'. Inmates often receive letters in the post soaked in the drug, which is difficult for officers to identify, but could be tackled using the UV wand tool. Biometric bracelets that can monitor a wearer's heart rate to try to predict stress levels and avoid violent outbursts are also being looked at, for use inside and outside jails. ‌ The wrist watches - which look similar to an Apple-style smartwatch - would also be able to 'nudge' offenders in the community to go to a probation or mental health appointment, as well as monitoring the GPS location of the wearer like an ankle tag. The watches can connect to an app, which is also available to victims and can alert them if a perpetrator is too close to them, for instance if there is a restraining order in place. Elsewhere much of the technology proposed would seek to cut down admin tasks for probation staff, including one app that would allow offenders in the community to complete a check-in form with an officer on their phone. Tracking devices inserted under offenders' skin were also reportedly suggested to ministers. Some human rights campaigners branded the idea 'alarmingly dystopian". ‌ Asked if Britain was moving towards Big Brother-style surveillance tactics, Prisons minister James Timpson told The Mirror: 'Victims come first. We're not scared of surveillance, and we're not scared of creating a prison outside of prison in someone's house, if that is the best way to deal with them. 'The fact is that when people are in the community, they're still being punished, and we need to make sure that their lives are restricted in the way we want them to be restricted, both for victims and also as part of their punishment.' ‌ Pressed on inserting trackers into people's skin, Lord Timpson said: 'I think we need to look at everything. I think we need to be brave and we need to make sure that we really focus on what's going to make a difference.' He admitted anything new you do in any organisation 'comes with risks', but added: 'But for me, the risk of not embracing technology far outweighs [those] if we don't embrace technology, especially in probation... They're crying out for technology. When probation staff joined the service, they didn't join the service to do 80% of their time doing admin. They joined the service to help people turn their lives around.' More than 90 companies initially pitched ideas to the Ministry of Justice, which were whittled down to seven firms, including Accenture, Scram System and SentrX.

Apple sues former Vision Pro employee for allegedly stealing 'thousands of documents' before joining Snap
Apple sues former Vision Pro employee for allegedly stealing 'thousands of documents' before joining Snap

NBC News

time7 hours ago

  • NBC News

Apple sues former Vision Pro employee for allegedly stealing 'thousands of documents' before joining Snap

Apple has accused a former engineer for its Vision Pro headset computer of stealing company trade secrets before starting a new job at Snap, according to a lawsuit filed in California last week. In the June 24 court filing, Apple accuses Di Liu, a senior design engineer, of downloading thousands of documents in his final days at the Cupertino company last year and saving them to his personal cloud accounts. This lawsuit is the latest example of Apple publicly going after a former employee for leaking internal information. Apple is an intensely secretive company, and lawsuits like this one highlight how the iPhone maker exercises tight control over its internal information, even if it has to pursue legal action against former staff. Apple alleges that Liu didn't inform the company when he resigned late last year that he was headed to Snap, a competitor and maker of smart glasses. As a result, Apple did not shut off his access to accounts and allowed him a customary two-week transition period, which he used to download company files, according to the lawsuit. 'Worse still, the review of Mr. Liu's Apple-issued work laptop also shows that while maintaining access to Apple's Proprietary Information under false pretenses, he used his Apple credentials to exfiltrate thousands of documents containing Proprietary Information from Apple's secure file storage systems,' the iPhone maker's lawyers said in the filing. Many of the files downloaded by Liu had codenames for Apple projects and described the company's technology, product design and supply chain, according to the lawsuit. Apple says that all employees agree to keep Apple files confidential and that Liu broke confidentiality agreements he made when he joined. Liu worked for Apple between 2017 and 2024, according to the lawsuit. Liu worked on Apple's Vision Pro headset as a system product design engineer, per the filing. Liu did not respond to a request for comment from CNBC. Apple lawyers wrote that Liu could use the trade secrets in his work at Snap. Apple is not suing Snap, and the social media company did not respond to a request for comment. 'The overlap between Apple's Proprietary Information that Mr. Liu retained and Snap's AR products (for which Mr. Liu is a 'product design engineer') suggests that Mr. Liu intends to use Apple's Proprietary Information at Snap,' according to the filing. Apple is seeking damages and for Liu to have his devices inspected by a forensic examiner to make sure all the trade secrets are deleted. The iPhone maker has sued several former employees in recent years for taking files when they left the company. Apple settled with former engineer Simon Lancaster in 2022 over providing information to a journalist. Apple also sued a former employee, Andrew Aude, in 2024 over leaking details to the media. That lawsuit was dismissed after Aude apologized. The Cupertino company sued Rivos, a chip startup staffed by former Apple semiconductor employees, over its intellectual property, and settled in 2024. Additionally at least three former Apple employees have also been arrested and accused by the government of taking company secrets and giving them to China-linked organizations. One pled guilty and was sentenced to four months in prison, and two are still in proceedings.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store