← All Defender Guides
Personal Devices

How Hackers Hack iPhones — and How to Protect Yourself

How attackers target iOS devices and what defences actually matter.

🛡️
Defender's Guide This is a defender-focused resource covering attack patterns at a conceptual level so you can recognise threats and protect yourself or your organisation. The page does not include step-by-step exploitation procedures. If you suspect you are currently being targeted or have been compromised, scroll to the recovery section below.

What attackers want from iPhones

iPhones have a tighter security model than Android — Apple's control over the App Store, mandatory app sandboxing, hardware-backed secure enclave for credentials, and consistent OS update distribution all reduce the attack surface meaningfully compared to Android in typical use. This is real and worth the credit it gets. It does not mean iPhones are invulnerable; it means the realistic attack patterns are different.

For typical users, the realistic threats are: phishing (mostly working at the account-level rather than the device-level), iCloud account compromise (which exposes much of what is on the device), stalkerware via shared Apple IDs in family situations, lost or stolen devices with weak passcodes, and exposure of session tokens and credentials in iOS apps with weaker security implementations.

For high-profile users, the threat model expands significantly. Pegasus and other commercial surveillance spyware specifically target iPhones — they are valuable targets because of who carries them (executives, journalists, activists, government officials). Defending against state-grade targeted attacks requires more than typical-user protections; Apple has built Lockdown Mode specifically for this scenario.

How attackers actually do it

Conceptual attack categories, not exploitation procedures. Understanding these patterns is what lets you recognise and defend against them.

Phishing for Apple ID credentials

Most common iPhone-related compromise. Fake "your Apple ID has been locked", "verify your account", "your iCloud is full" emails and SMS lead to fake Apple login pages. Compromised Apple ID grants access to iCloud (photos, files, contacts, location), Find My (potential abuse), iMessage history, and the ability to lock the device remotely.

Lost/stolen device with weak passcode

iPhones with 4-digit numeric passcodes are vulnerable to brute force on devices, particularly older iPhones with longer passcode-attempt windows. Stolen devices with no passcode at all give immediate access to everything. Modern iPhones with strong passcodes and Face ID/Touch ID are well protected; older devices and weak passcodes are not.

Stalkerware via shared Apple ID (family/abuse situations)

Family Sharing or shared Apple ID allows account holder to see device location, sometimes messages, photo library. In intimate-partner-abuse situations, abusers may have set up shared Apple IDs that grant ongoing surveillance capability even after physical separation. Less obvious than installed stalkerware but functionally similar surveillance.

iCloud account compromise

Apple ID is the master account for iPhone — controls iCloud backup access, Find My, iMessage, app purchases, payment methods. iCloud backups (if not E2E encrypted via Advanced Data Protection) include photos, messages, app data — accessible to attackers with iCloud account access without needing the physical device.

Pegasus and other commercial spyware (high-profile targets)

NSO Group's Pegasus and similar commercial spyware (Predator, FinSpy variants, others) specifically target iPhones via zero-click exploitation chains. Used against journalists, activists, government officials, business executives. Each successful attack costs $100K+ to develop, so deployment is targeted not mass. Apple's Lockdown Mode is specifically designed to disrupt these attack chains.

Configuration profile abuse

iOS configuration profiles can grant deep device access — used legitimately for enterprise device management. Malicious profiles installed via social engineering ("install this profile to use this WiFi") can route traffic through attacker-controlled servers, install root certificates enabling traffic interception, change device settings.

iMessage zero-click exploits

iMessage has been a recurring target for sophisticated zero-click exploitation — attacker sends a crafted message that exploits iOS without user interaction. Apple patches these as discovered; period between vulnerability discovery and patch is the window of exposure. Lockdown Mode disables features (link previews, certain attachment types) that have been exploit vectors.

Public WiFi / network-level attacks

Same considerations as Android — captive portal phishing, traffic interception on hostile WiFi, malicious WiFi networks. iPhone is reasonably resilient but not immune. Apps with weak certificate validation or non-HTTPS traffic are exposed.

How to recognise compromise

Signs that your iphones may have been compromised:

Battery draining unusually fast or device running hot when idle

Background processes from spyware consume battery and produce heat. Sustained unexplained battery drain or heat when device should be idle warrants investigation. Settings → Battery shows app-by-app battery usage; unusual entries are suspicious.

Apple ID activity from unfamiliar devices

Settings → [your name] → see signed-in devices. Any device you do not recognise is suspicious. Apple sends emails for new device sign-ins; respond to these promptly.

iCloud password change emails you did not request

If you receive password change confirmation for changes you did not make, your Apple ID is being compromised. Act within minutes — change password, enable additional protections, audit account.

Configuration profiles you did not install

Settings → General → VPN & Device Management. Any profiles you did not install or do not recognise should be removed. Profile install is a common stalkerware/abuse pattern.

Unfamiliar Family Sharing members or shared accounts

Settings → [your name] → Family Sharing. Anyone you do not expect should be removed. Particularly important after relationship changes — partners with Family Sharing access retain visibility into device usage and location until removed.

Device acting strangely after specific events

Slowness, crashes, unexpected restarts that began after specific events (clicking suspicious link, installing profile, connecting to unusual WiFi) suggest investigation.

Apple sends "you may have been targeted" notification

Apple notifies users believed to be targets of state-sponsored attacks. This notification is the most direct possible signal. If you receive it, take it seriously — enable Lockdown Mode, contact Citizen Lab or similar organisations for forensic analysis.

What actually protects you

Concrete actions ranked by impact. Items marked critical are the highest-leverage protections; do those first.

Strong passcode (6+ digits, ideally alphanumeric) and Face ID/Touch ID

Settings → Face ID & Passcode. 6-digit numeric minimum; alphanumeric passcode for highest security. Face ID/Touch ID as convenience for unlock; passcode required after restart, software update, or extended idle. Strong passcode is fundamental — without it, physical device security is compromised.

Hardware security key or app-based 2FA on Apple ID

Apple ID supports hardware security keys (recommended) or app-based 2FA. Settings → [your name] → Sign-In & Security → Two-Factor Authentication. Defeats most Apple ID compromise attempts. SMS-based 2FA on Apple ID is not Apple's default approach; modern Apple 2FA uses trusted devices generating codes locally.

Enable Advanced Data Protection (Apple's E2E iCloud encryption)

Settings → [your name] → iCloud → Advanced Data Protection. Encrypts iCloud data (photos, backups, notes, etc.) end-to-end so even Apple cannot decrypt. Requires recovery key or recovery contact setup. Eliminates one of the largest attack surfaces (iCloud account compromise leading to data exposure).

Keep iOS updated

Settings → General → Software Update → Automatic Updates. Apple distributes security patches consistently across supported devices; install promptly. Most successful iPhone exploitation targets known vulnerabilities patched in recent updates the user has not installed.

Enable Lockdown Mode for high-risk users

Settings → Privacy & Security → Lockdown Mode. Disables certain features that have been exploit vectors (link previews, some attachment types, JavaScript JIT). Some compatibility tradeoffs (some websites/apps work less well). Worth enabling for journalists, activists, executives, government officials, and anyone receiving Apple's state-sponsored-attack warning.

Audit Family Sharing and connected devices regularly

Settings → [your name] → Family Sharing. Settings → [your name] → see device list. Remove anything unexpected. Particularly important after relationship changes (partners, family members) or device upgrades (old devices forgotten on the account).

Be cautious of configuration profiles

Never install profiles from untrusted sources. Audit installed profiles periodically (Settings → General → VPN & Device Management). Legitimate use cases: enterprise MDM, specific WiFi networks (universities, conferences). Anything else: investigate before installing.

Use App Store apps only; do not jailbreak

iOS App Store has imperfect but meaningful review. Jailbroken iPhones lose much of the security model that protects from malicious apps. The customisation benefits rarely justify the security cost for most users.

Enable Stolen Device Protection (iOS 17.3+)

Settings → Face ID & Passcode → Stolen Device Protection. Requires biometric (not just passcode) for sensitive actions when device is in unfamiliar location, plus delay before some changes can take effect. Major improvement against stolen-device-with-known-passcode scenarios (where thief observed passcode and stole device).

For high-risk users: consult Apple Security Engineering

Apple has resources specifically for journalists, activists, and others with elevated threat models. Apple Threat Notification Program, Citizen Lab consultation, EFF guides. Targeted threat models deserve targeted defensive expertise rather than relying on consumer-level guidance.

Frequently Asked Questions

For typical users with default configurations and apps from official stores: somewhat yes, due to tighter App Store control, mandatory sandboxing, hardware secure enclave, and consistent OS update distribution. The differences are real but not as large as marketing suggests. Both can be secured well with appropriate practices; both can be vulnerable when poorly configured or used carelessly.
Possible but uncommon for typical users. Most realistic remote compromise paths: Apple ID phishing (account-level rather than device-level), iCloud account compromise (exposes much of what is on device), sophisticated targeted attacks (Pegasus-class, expensive, used against high-profile targets only). For typical users, the realistic threat is account-level compromise via phishing or device-level compromise via physical access, not zero-click remote attacks.
Apple's extreme security mode that disables certain features known to be exploit vectors — link previews, JavaScript JIT, some attachment types, complex font rendering. Some compatibility tradeoffs (some websites and apps work less well). Worth enabling for journalists, activists, executives, government officials, anyone receiving Apple's state-sponsored-attack notification, anyone with elevated threat model. Not necessary for typical users.
Apple's end-to-end encryption for additional iCloud data categories (photos, backups, notes, etc.). When enabled, even Apple cannot decrypt your iCloud data. Tradeoff: requires recovery key or recovery contact setup; if you lose access to both Apple account and recovery, data is unrecoverable. Worth enabling for users who want strongest iCloud privacy; understand the recovery responsibility.
For security purposes, no. Jailbreaking bypasses iOS security boundaries that protect you from malicious apps. Apps designed for jailbroken devices have access to deeper system functions. Jailbreaking also breaks app integrity attestation used by banking apps, payment systems, etc. Customisation benefits rarely justify the security cost.
iPhones are highly resistant to traditional viruses due to mandatory app sandboxing and App Store review. Practical risks: malicious profiles installed via social engineering, OAuth abuse via malicious apps, network-level attacks on hostile WiFi, sophisticated targeted attacks on unpatched vulnerabilities. "Antivirus apps" for iPhone are mostly marketing — iOS architecture does not really support them.
Apple sends these to users believed to be targets of state-sponsored attacks (mercenary spyware like Pegasus). Direct, serious indicator. If you receive it: enable Lockdown Mode immediately, contact Citizen Lab or similar organisations for forensic analysis, audit your accounts and contacts, consider professional incident response. Apple does not send these casually.
Apple supports iPhones with iOS updates for approximately 5-6 years from release. Specific support varies — check Apple's current iOS compatibility list. Devices no longer receiving updates accumulate unpatched vulnerabilities; replacing them is a reasonable security investment.
Yes — Find My uses end-to-end encryption for location sharing. Apple cannot see your location data; only authorised devices/contacts can. The privacy concerns about Find My are different — abuse via Family Sharing or shared Apple ID granting unwanted ongoing location visibility. Audit who has access to your location periodically.
iCloud Backup is convenient and protects against device loss. With Advanced Data Protection enabled, iCloud Backup is end-to-end encrypted — even Apple cannot read it. Without ADP, iCloud Backup is encrypted in transit and at rest but Apple holds keys. For users wanting strongest privacy: enable ADP. For typical users: regular iCloud Backup with strong Apple ID security is reasonable.