Discover all the iPhone viruses discovered to date (and protect yourself from them). Photo: reproduction / axios.

Discover all the iPhone viruses discovered to date (and protect yourself from them) 5z11t

Alexandre Marques Avatar
Anyone who thinks that iOS, the iPhone's operating system, is free from threats such as viruses is mistaken. See which ones have already been found and learn how to protect yourself from them.

The devices iPhone are widely known for their security, but that does not make them immune to virus attacks and malwares. Over the years, several types of threats have been identified that affect s' privacy and security. iPhone virus can infiltrate apps, messages, and even websites that may seem harmless at first glance. In this article, we’ll learn about all the iPhone viruses discovered to date and show you how to protect yourself from them. Check it out: u72v

Ikee (2009) 18213f

Ikee was the first worm to infect jailbroken iPhones, changing the background image to a photo of Rick Astley. Photo: Reproduction / Digital Studio Middle East.

Discovered in 2009, the Ikea was the first worm, a type of malware (malicious software) to infect iPhones. This virus spread between devices that had SSH (Secure Shell) installed and whose s have not changed the default . The worm that automatically spreads from one device to another without requiring interaction — it changed the lock screen background image to a photo of the singer Rick Astley, accompanied by the phrase “ikee is never going to give you up“While it did not cause serious damage, it highlighted the vulnerability of the devices jailbroken.

Nowadays, the Ikea is no longer an active threat, as the Apple implemented more robust security measures and s became more aware of the importance of changing default s and avoiding installing unverified software. In addition, the company also disabled SSH by default on iOS devices, making it harder for attacks to spread worms similar.

Ghost (2009) 11156

Duh evolved from Ikee and turned jailbroken iPhones into botnets to steal banking data. Photo: Reproduction / Keep Security.

O Duh was discovered two weeks after the Ikea and was a more malicious evolution of the virus. It also spread among iPhones jailbroken and used the code of Ikea to propagate. However, unlike Ikee, Duh functioned as a botnet, communicating with a command center and trying to steal banking data from s of the ING Direct.

O Duh is no longer a threat, as the Apple has taken steps to strengthen the security of iOS devices and s have become more aware of the risks of jailbreak. In addition Apple disabled SSH by default and encouraged s to keep their devices up to date and avoid installing software not verified.

WireLurker (2014) 82x3a

WireLurker spread through infected macOS computers, installing trojanized applications on iPhones. Photo: Reproduction / La Vanguardia.

O WireLurker was discovered in 2014 and was a malware that infected iOS devices through infected macOS computers. It spread primarily through Maiyadi App Store, a third-party store in China, where 467 infected apps were ed over 350.000 times. The WireLurker sent information about connected devices to a command server and attempted to install “trojanized” versions of common applications on iOS devices.

O WireLurker is no longer active, as the Apple has taken steps to prevent iOS devices from being infected through enterprise provisioning programs and has improved the security of apps on the App Store.

Mask Attack (2014) 62q3a

The Masque Attack allowed malicious apps to replace legitimate apps on iPhones. Photo: Reproduction / Internet.

O Masque Attack was a security vulnerability in iOS discovered by the security firm FireEye in July 2014. This flaw allowed malicious apps to be installed on iOS devices, replacing legitimate apps. s were tricked into ing these apps from unverified sources, which could then access sensitive data such as credentials. The vulnerability affected both devices with jailbreak as those without modifications, as long as the accepted the installation of the fake application.

Nowadays, the Masque Attack is no longer a concern, as the Apple implemented security measures to prevent the installation of applications from unverified sources.

KeyRaider (2015) 4m3r2b

KeyRaider stole information and s from jailbroken iPhones, demanding a ransom to unlock them. Photo: Reproduction / Fox News.

O KeyRaider was discovered in August 2015 and affected iOS devices jailbroken. They malware allowed criminals to steal s' information and s, as well as lock their devices and demand a ransom to unlock them. It was found on a Chinese website and has spread to 18 countries, affecting more than 225.000 people. KeyRaider worked silently, capturing data from Apple ID and other data shared with iTunes.

A Apple disabled SSH by default and encouraged s to keep their devices up to date and avoid installing unverified software, which eliminated the KeyRaider.

XcodeGhost (2015) 2j1u3n

XcodeGhost infected popular App Store apps through a modified version of Xcode. Photo: Reproduction / Apple.

O XcodeGhost was discovered in September 2015 and was considered the first major large-scale attack on the App Store. It was inserted into apps through a modified version of Xcode, the development environment for Apple . These infected apps have been ed by millions of s, including popular ones like WeChat and Netease Music. O XcodeGhost could report device information and try Phishing of sensitive data.

O XcodeGhost is no longer an active threat, as the Apple has taken steps to prevent the distribution of modified versions of Xcode and improved the security of apps on the App Store.

Pegasus (2016) 6m6k62

Pegasus is an advanced spyware that can intercept messages and access the camera and microphone of iPhones, without the need for interaction. Photo: Reproduction / Kaspersky.

Discovered in 2016, the Pegasus is an spyware developed by the Israeli company NSO Group. It is known for its ability to infiltrate iOS and Android devices without requiring interaction, such as clicking a link or ing an app. Pegasus can intercept messages, track calls, access the device's camera and microphone, and collect data from apps such as WhatsApp, iMessage and others. It has been widely used by governments for espionage, but has also been misused to monitor journalists, activists, and other figures of interest.

Nowadays, the Pegasus still exists, but the Apple and other organizations continue to work to identify and fix the vulnerabilities it exploits. s can protect themselves by keeping their devices up to date and using with of reliable security.

AceDeceiver (2016) 2op3y

AceDeceiver abused flaws in Apple's copyright protection system to install malicious apps on non-jailbroken iPhones. Photo: Wachiwit / Shutterstock.

O AceDeceiver was discovered in 2016 and is notable for being the first iOS malware that can infect devices without needing jailbreak. He abused flaws in the copyright protection system of Apple , known as FairPlay, to install malicious applications. The infected applications were disguised as wallpaper applications and could steal sensitive information from s.

O AceDeceiver is no longer an active threat, as the Apple took steps to fix the flaws it exploited and improve the security of apps on the App Store.

LightSpy (2020) 6l4pi

LightSpy is spyware that can capture sensitive information from iPhones, such as messages, s and application data. Photo: Reproduction / Kaspersky.

O LightSpy was discovered in 2020 and is a spyware targeting iOS devices. It uses an exploit chain to infect devices and can capture a wide range of sensitive information such as SMS messages, s, location, and app data such as WhatsApp e WeChat. O LightSpy also has some plugins destructive actions that may freeze the device or prevent it from restarting.

Although the Apple constantly work to reinforce the security of their devices, s must redouble their care, keeping the system always updated and adopting extra digital protection measures to avoid LightSpy, which remains active.

Operation Triangulation (2023) 5a316t

Operation Triangulation involved a chain of four zero-day vulnerabilities, targeting espionage on iOS devices. Photo: Reproduction / Kaspersky.

Discovered in June 2023, the Operation Triangulation was a sophisticated cyberattack targeting iOS devices. The attack involved a chain of four vulnerabilities in zero-day, for espionage, extracting messages, s and tracking the geolocation of affected devices. The attack was highly stealthy and affected thousands of devices, including those of commercial, government and diplomatic organizations in Russia.

Currently, the Apple continues to work to identify and fix the vulnerabilities exploited by Operation Triangulation. s can protect themselves by keeping their devices updated with the latest versions of iOS, avoiding clicking on suspicious links, and using reliable security software.

SparkCat (2025) 4l492p

SparkCat uses optical character recognition (OCR) to scan images and screenshots on iPhones, extracting sensitive information. Photo: Reproduction / Kaspersky.

O SparkCat, discovered in early 2025, is a new malware directed to iPhones. It uses optical character recognition (OCR) to scan images and screenshots stored on the device, extracting sensitive information such as s and financial data. The SparkCat disguises itself as legitimate apps on the App Store and can be found in various types of apps, including chatbots and delivery apps.

O SparkCat is still an active threat. To protect yourself, s should avoid ing apps from unverified sources, keep their devices up to date, and use reliable security software. Additionally, it is important to be aware of the permissions granted to apps and regularly review the device's privacy settings.

No showmetech, we have a special article delving deeper into the virus SparkCat. Look:

In general, to maintain your iPhone protected, it is essential keep the operating system always updated, avoid ing apps from unknown sources e use reliable security software. So, have you ever heard of any of these? iPhone virus? Tell us here in the comments!

See also:

Sources: Maaw, Discussions Apple e Kaspersky.

reviewed by Gabriel Princessval in 19 / 02 / 2025

Leave a comment Cancel reply 26673o
Related Posts 593ri

Bespoke AI: Samsung showcases connected home products in Mexico 1m664y

Samsung's smart home in Mexico City shows how life can be more convenient with AI and the SmartThings ecosystem. See all products
bruno martinez avatar
Learn more

How to Facebook videos (and stories too) nj2u

Discover websites and apps to videos from Facebook in less than 5 minutes on PC, Android or iOS
victor pacheco avatar
Learn more

OPPO A5 Pro 5G Smartphone Combines Military-Grade Ruggedness and Long-Lasting Battery 2f1h49

The cell phone is a safe choice for those who face the routine on the streets. With protection against water, it can handle falls and rain with ease. Check it out
Alexandre Marques Avatar
Learn more