Hackers have found a sneaky new way to spy on your iPhone — here’s how (2024)

One of the many reasons people decide to go with one of the best iPhones over their Android counterparts is due to security. However, as iPhones are known for being less prone to hacking, this also makes them the perfect target for hackers and other cybercriminals.

Now though, it appears that hackers have figured out a clever way to bypass Apple’s security checks through the use of third-party custom keyboards that let them spy on iPhone users.

According to a new report from security researcher Russell Kent-Payne at Certo Software, this new attack method uses malicious keyboards to record private messages, browsing history and even passwords from unsuspecting iPhone users.

Certo decided to look into the matter after the cybersecurity firm received multiple reports of cyberstalking incidents in which the stalkers appeared to know everything that their target had typed into their iPhone. Following its investigation, malicious third-party keyboards were found on all of the affected devices.

Whether you use an iPhone with a third-party keyboard yourself or are worried about being spied on, here’s everything you need to know about this new threat including steps you can take to protect yourself.

Abusing TestFlight to install custom keyboards

Hackers have found a sneaky new way to spy on your iPhone — here’s how (1)

Normally when it comes to spying on iPhone users, an attacker would need to jailbreak a target’s device or gain access to their iCloud account. What sets this new attack apart though, is that it doesn’t rely on either of these methods to spy on iPhone users.

Although they’re not normally dangerous, this attack weaponized third-party keyboards by using malicious ones to serve as keyloggers on vulnerable devices. From here, a hacker can discreetly capture and transmit all of the keystrokes an iPhone user makes on their device.

Sign up to get the BEST of Tom's Guide direct to your inbox.

Get instant access to breaking news, the hottest reviews, great deals and helpful tips.

While Certo didn’t go into all of the nitty gritty details about this attack to avoid providing other hackers with a blueprint, it did explain how it works. To reach potential victims, the hackers behind this campaign are abusing Apple’s own TestFlight platform which is used for testing new iOS apps before they’re released on the App Store.

By putting out their malicious keyboards via TestFlight, the hackers are able to avoid being detected by Apple since apps on the platform don’t undergo the same rigorous security tests that App Store apps do. However, as Kent-Payne points out in his report on the matter, a malicious custom keyboard could theoretically be distributed via any app.

Once the TestFlight app is installed on the targeted iPhone, the hackers install a custom keyboard via the Settings app and configure it so that it has “Full Access” to the device. From here, they then switch the iPhone’s default keyboard with this custom version which is visually indistinguishable from Apple’s stock keyboard.

The malicious keyboard is then able to record everything a victim types and all of this information is sent back to a command and control () server operated by the hackers behind this campaign.

How to see if hackers have installed a malicious keyboard on your iPhone

Hackers have found a sneaky new way to spy on your iPhone — here’s how (2)

If you’re worried that there might be a malicious keyboard that’s working as a keylogger installed on your iPhone, Certo has provided a few steps to see if you’re affected.

To get started, open your iPhone’s Settings app and then go to General, Keyboard and finally Keyboards. Here, you’ll see two standard keyboards: One in your language and another named “Emoji”. If you see another keyboard here — like one you don’t remember installing — this could be cause for concern, especially if it has “Allow Full Access” turned on.

If this is the case, you’re going to want to remove any unrecognized custom keyboards. This can be done by tapping on Edit, tapping the red minus button next to any keyboard you don’t recognize and then tapping Delete.

For those looking for extra protection for their Apple devices, you should also consider installing the best Mac antivirus software. While there isn’t an iPhone equivalent of the best Android antivirus apps, both Intego Mac Internet Security X9 and Intego Mac Premium Bundle X9 can scan your iPhone or even your iPad for malware but they need to be connected to your Mac via a USB cable.

At the moment, Apple hasn’t said anything publicly about this new attack method but we’ll update this piece if and when the company does.

More from Tom's Guide

  • Apple issues emergency security updates for iPhones and Macs
  • This is the one reason iPhone still beats Android on security
  • iLeakage attack can steal your emails and passwords on iPhone and Mac
Hackers have found a sneaky new way to spy on your iPhone — here’s how (2024)

FAQs

Can someone spy on my iPhone without me knowing? ›

There is a way someone can monitor your mobile phone without ever touching the actual device. Spyware (a portmanteau of 'spying software) and stalkerware can be installed on a phone without the owner's knowledge, allowing an attacker to steal information, track activity, and more.

How would you know if someone is spying on your iPhone? ›

An unexplained increase in data usage could be a sign of spyware. Since the malicious software has to send collected data back to an external server, this leads to an increase in data uploaded from your device. Both iOS and Android allow you to check both mobile and Wi-Fi data usage of each installed app.

What can a hacker see on your iPhone? ›

Once it's on your iPhone, malware can hijack your phone's resources and steal sensitive information. Unsecured Wi-Fi: Public Wi-Fi networks are often unencrypted, potentially exposing the data you send and receive—including logins, messages, and financial data—to hackers.

Can I check if my iPhone is hacked? ›

Your phone is hotter than usual or runs out of battery quickly. These are red flags indicating that there may be apps or processes running in the background that you don't know about. Unfamiliar apps on your homescreen. These apps could have been installed by hackers and used to access your files or spy on you.

What is the code to see if someone is spying on your phone? ›

Code to show unknown connections and tracking (for Android): *#*#4636#*#* or *#*#197328640#*#* Code to show unknown connections and if someone is tracing you (for iPhone): *3001#12345#*

Can someone see your iPhone screen remotely? ›

Yes, a partner, parent, or even employer can gain remote, real-time access to your iPhone using spying software. Spyware can track your GPS location, record your keypad inputs such as credit card numbers and passwords, and monitor your calls, texts, app usage, emails, voice, and other personal data.

What is the 3 digit number to see if your phone is tapped? ›

What is the 3-digit number to see if your phone is tapped? The three digits to see if your phone is tapped are 002. Specifically, you need to first dial *#062# or *#21# to check if your calls are being intercepted in any way – i.e., either redirected or diverted.

Can I scan my iPhone for spyware? ›

Numerous security apps available on the App Store can assist you in finding spyware on your iPhone. Some popular options include Avast, Lookout, and Norton. Download and run any of these apps to scan your device for potential threats.

Can someone see you through your phone camera iPhone? ›

Mobile spyware is malware that allows hackers to steal information and watch anything within view of your phone camera. It can also enable them to access your microphone, location, calendar, and contacts. This makes it possible for hackers to record your videos and calls.

How to stop someone from accessing your phone remotely on an iPhone? ›

Change your passwords. Remove/uninstall suspicious apps. Implement two-factor authentication (2FA) Clear your cache.

How do I run a security check on my iPhone? ›

To access Safety Check, go to Settings > Privacy & Security > Safety Check. Note: If you donʼt have access to Safety Check or youʼre having trouble using the feature, you can manually adjust your sharing settings and access to your device and accounts. See How to stop sharing your iPhone or iPad content.

What is the free app to check if iPhone is hacked? ›

Avast Mobile Security, a free antivirus for iPhones, has all the tools you need to scan for hidden threats, such as: Scanning any Wi-Fi network for vulnerabilities before connecting. Monitoring unlimited email addresses for password leaks.

Does *#21 really tell you if your phone is hacked? ›

FACT-CHECK

They are also called Interrogation codes. Mobile security experts from both Google (Android) and Apple (iPhone) have addressed and clarified rumors related to *#21# code. It only checks if call forwarding is active on a phone or not.

Can someone see everything I do on my iPhone? ›

Technically, yes. Whether it's a friend, employer, or cybercriminal, there's a possibility that someone could spy on your iPhone. Despite iOS's advanced security features, no device is entirely immune to remote access and spying. One notorious example of such spyware is Pegasus.

Can someone access my iPhone without my knowledge? ›

iPhones are vulnerable to hacking despite being more secure than Android devices. Hackers can exploit security loopholes in the iOS operating system or third-party apps to gain unauthorized access to your device, steal personal data, or install malware.

Can someone share my iPhone screen without me knowing? ›

If someone gains access to your phone, they can install such an app and view your screen remotely. Spyware. Malicious software designed to operate stealthily can be installed on your device. This software can capture your screen, among other private data, and send it to a third party without your consent.

Can someone access my iPhone camera without me knowing? ›

Yes, with the right software or spyware, it's possible for someone to watch you through your smartphone's camera and record what they see. There are protections built into your phone to prevent this, but more sophisticated attacks can get around them.

Top Articles
Dr Jaime Campos Tijuana Bad Reviews
Riverside Coroner Press Release
Spasa Parish
Rentals for rent in Maastricht
159R Bus Schedule Pdf
Sallisaw Bin Store
Black Adam Showtimes Near Maya Cinemas Delano
Espn Transfer Portal Basketball
Pollen Levels Richmond
11 Best Sites Like The Chive For Funny Pictures and Memes
Things to do in Wichita Falls on weekends 12-15 September
Craigslist Pets Huntsville Alabama
Paulette Goddard | American Actress, Modern Times, Charlie Chaplin
What's the Difference Between Halal and Haram Meat & Food?
R/Skinwalker
Rugged Gentleman Barber Shop Martinsburg Wv
Jennifer Lenzini Leaving Ktiv
Justified - Streams, Episodenguide und News zur Serie
Epay. Medstarhealth.org
Olde Kegg Bar & Grill Portage Menu
Cubilabras
Half Inning In Which The Home Team Bats Crossword
Amazing Lash Bay Colony
Juego Friv Poki
Dirt Devil Ud70181 Parts Diagram
Truist Bank Open Saturday
Water Leaks in Your Car When It Rains? Common Causes & Fixes
What’s Closing at Disney World? A Complete Guide
New from Simply So Good - Cherry Apricot Slab Pie
Drys Pharmacy
Ohio State Football Wiki
Find Words Containing Specific Letters | WordFinder®
FirstLight Power to Acquire Leading Canadian Renewable Operator and Developer Hydromega Services Inc. - FirstLight
Webmail.unt.edu
2024-25 ITH Season Preview: USC Trojans
Metro By T Mobile Sign In
Restored Republic December 1 2022
12 30 Pacific Time
Jami Lafay Gofundme
Litter-Robot 3 Pinch Contact & Dfi Kit
Greenbrier Bunker Tour Coupon
No Compromise in Maneuverability and Effectiveness
Black Adam Showtimes Near Cinemark Texarkana 14
Teamnet O'reilly Login
U-Haul Hitch Installation / Trailer Hitches for Towing (UPDATED) | RV and Playa
Minute Clinic Schedule 360
Tyson Foods W2 Online
Bella Poarch Husband: A Deep Dive Into Her Relationship And Personal Life
Best Drugstore Bronzers
Maria Butina Bikini
Busted Newspaper Zapata Tx
Latest Posts
Article information

Author: Nicola Considine CPA

Last Updated:

Views: 5443

Rating: 4.9 / 5 (69 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Nicola Considine CPA

Birthday: 1993-02-26

Address: 3809 Clinton Inlet, East Aleisha, UT 46318-2392

Phone: +2681424145499

Job: Government Technician

Hobby: Calligraphy, Lego building, Worldbuilding, Shooting, Bird watching, Shopping, Cooking

Introduction: My name is Nicola Considine CPA, I am a determined, witty, powerful, brainy, open, smiling, proud person who loves writing and wants to share my knowledge and understanding with you.