Table of Contents 64q43
The devices iPhone are widely known for their security, but that does not make them immune to virus attacks and malwares. Over the years, several types of threats have been identified that affect s' privacy and security. iPhone virus can infiltrate apps, messages, and even websites that may seem harmless at first glance. In this article, we’ll learn about all the iPhone viruses discovered to date and show you how to protect yourself from them. Check it out: u72v
Ikee (2009) 18213f

Discovered in 2009, the Ikea was the first worm, a type of malware (malicious software) to infect iPhones. This virus spread between devices that had SSH (Secure Shell) installed and whose s have not changed the default . The worm that automatically spreads from one device to another without requiring interaction — it changed the lock screen background image to a photo of the singer Rick Astley, accompanied by the phrase “ikee is never going to give you up“While it did not cause serious damage, it highlighted the vulnerability of the devices jailbroken.
Nowadays, the Ikea is no longer an active threat, as the Apple implemented more robust security measures and s became more aware of the importance of changing default s and avoiding installing unverified software. In addition, the company also disabled SSH by default on iOS devices, making it harder for attacks to spread worms similar.
Ghost (2009) 11156

O Duh was discovered two weeks after the Ikea and was a more malicious evolution of the virus. It also spread among iPhones jailbroken and used the code of Ikea to propagate. However, unlike Ikee, Duh functioned as a botnet, communicating with a command center and trying to steal banking data from s of the ING Direct.
O Duh is no longer a threat, as the Apple has taken steps to strengthen the security of iOS devices and s have become more aware of the risks of jailbreak. In addition Apple disabled SSH by default and encouraged s to keep their devices up to date and avoid installing software not verified.
WireLurker (2014) 82x3a

O WireLurker was discovered in 2014 and was a malware that infected iOS devices through infected macOS computers. It spread primarily through Maiyadi App Store, a third-party store in China, where 467 infected apps were ed over 350.000 times. The WireLurker sent information about connected devices to a command server and attempted to install “trojanized” versions of common applications on iOS devices.
O WireLurker is no longer active, as the Apple has taken steps to prevent iOS devices from being infected through enterprise provisioning programs and has improved the security of apps on the App Store.
Mask Attack (2014) 62q3a

O Masque Attack was a security vulnerability in iOS discovered by the security firm FireEye in July 2014. This flaw allowed malicious apps to be installed on iOS devices, replacing legitimate apps. s were tricked into ing these apps from unverified sources, which could then access sensitive data such as credentials. The vulnerability affected both devices with jailbreak as those without modifications, as long as the accepted the installation of the fake application.
Nowadays, the Masque Attack is no longer a concern, as the Apple implemented security measures to prevent the installation of applications from unverified sources.
KeyRaider (2015) 4m3r2b

O KeyRaider was discovered in August 2015 and affected iOS devices jailbroken. They malware allowed criminals to steal s' information and s, as well as lock their devices and demand a ransom to unlock them. It was found on a Chinese website and has spread to 18 countries, affecting more than 225.000 people. KeyRaider worked silently, capturing data from Apple ID and other data shared with iTunes.
A Apple disabled SSH by default and encouraged s to keep their devices up to date and avoid installing unverified software, which eliminated the KeyRaider.
XcodeGhost (2015) 2j1u3n

O XcodeGhost was discovered in September 2015 and was considered the first major large-scale attack on the App Store. It was inserted into apps through a modified version of Xcode, the development environment for Apple . These infected apps have been ed by millions of s, including popular ones like WeChat and Netease Music. O XcodeGhost could report device information and try Phishing of sensitive data.
O XcodeGhost is no longer an active threat, as the Apple has taken steps to prevent the distribution of modified versions of Xcode and improved the security of apps on the App Store.
Pegasus (2016) 6m6k62

Discovered in 2016, the Pegasus is an spyware developed by the Israeli company NSO Group. It is known for its ability to infiltrate iOS and Android devices without requiring interaction, such as clicking a link or ing an app. Pegasus can intercept messages, track calls, access the device's camera and microphone, and collect data from apps such as WhatsApp, iMessage and others. It has been widely used by governments for espionage, but has also been misused to monitor journalists, activists, and other figures of interest.
Nowadays, the Pegasus still exists, but the Apple and other organizations continue to work to identify and fix the vulnerabilities it exploits. s can protect themselves by keeping their devices up to date and using with of reliable security.
AceDeceiver (2016) 2op3y

O AceDeceiver was discovered in 2016 and is notable for being the first iOS malware that can infect devices without needing jailbreak. He abused flaws in the copyright protection system of Apple , known as FairPlay, to install malicious applications. The infected applications were disguised as wallpaper applications and could steal sensitive information from s.
O AceDeceiver is no longer an active threat, as the Apple took steps to fix the flaws it exploited and improve the security of apps on the App Store.
LightSpy (2020) 6l4pi

O LightSpy was discovered in 2020 and is a spyware targeting iOS devices. It uses an exploit chain to infect devices and can capture a wide range of sensitive information such as SMS messages, s, location, and app data such as WhatsApp e WeChat. O LightSpy also has some plugins destructive actions that may freeze the device or prevent it from restarting.
Although the Apple constantly work to reinforce the security of their devices, s must redouble their care, keeping the system always updated and adopting extra digital protection measures to avoid LightSpy, which remains active.
Operation Triangulation (2023) 5a316t

Discovered in June 2023, the Operation Triangulation was a sophisticated cyberattack targeting iOS devices. The attack involved a chain of four vulnerabilities in zero-day, for espionage, extracting messages, s and tracking the geolocation of affected devices. The attack was highly stealthy and affected thousands of devices, including those of commercial, government and diplomatic organizations in Russia.
Currently, the Apple continues to work to identify and fix the vulnerabilities exploited by Operation Triangulation. s can protect themselves by keeping their devices updated with the latest versions of iOS, avoiding clicking on suspicious links, and using reliable security software.
SparkCat (2025) 4l492p

O SparkCat, discovered in early 2025, is a new malware directed to iPhones. It uses optical character recognition (OCR) to scan images and screenshots stored on the device, extracting sensitive information such as s and financial data. The SparkCat disguises itself as legitimate apps on the App Store and can be found in various types of apps, including chatbots and delivery apps.
O SparkCat is still an active threat. To protect yourself, s should avoid ing apps from unverified sources, keep their devices up to date, and use reliable security software. Additionally, it is important to be aware of the permissions granted to apps and regularly review the device's privacy settings.
No showmetech, we have a special article delving deeper into the virus SparkCat. Look:
In general, to maintain your iPhone protected, it is essential keep the operating system always updated, avoid ing apps from unknown sources e use reliable security software. So, have you ever heard of any of these? iPhone virus? Tell us here in the comments!
See also:
Sources: Maaw, Discussions Apple e Kaspersky.
reviewed by Gabriel Princessval in 19 / 02 / 2025