Page cover

whatsappWhatsApp Zero-Day: Silent Sypware Attacks on iOS & macOS

Overview

A sophisticated spyware campaign has been uncovered, chaining a WhatsApp vulnerability (CVE-2025-55177arrow-up-right) with an Apple ImageIO flaw (CVE-2025-43300) to silently compromise fully patched iPhones, Macs, and iPads.

This attack requires no user interaction - no clicks, downloads, or links. It uses WhatsApp's device-link feature to deliver payloads invisibly.

Investigators confirmed fewer than 200 high-risk targets, mostly journalists, activists, and dissidents, but the tradecraft involved demonstrates nation-state-level expertise and resources.

Vulnerability Deep Dive

The attack relies on two core vulnerabilities:

  • CVE-2025-55177:arrow-up-right A flaw in WhatsApp's device-link synchronization process allows specially crafted messages to bypass authorization, enabling remote payload delivery.

  • CVE-2025-43300:arrow-up-right A memory corruption bug in Apple's ImageIO framework enables attackers to achieve remote code execution and escape app sandboxes.

By chaining these together, attackers gain complete device compromise including access to WhatsApp messages, keychain credentials, microphone, camera, and local files.

Attack Chain

The attack starts with a zero-click payload delivery. Malicious sync messages are silently parsed by WhatsApp, with no visible trace in chat logs. The payload then triggers ImageIO to process a booby-trapped image, causing a memory write that gives attackers code execution privileges.

From there, the exploit escalates privileges, escapes the iOS/macOS sandbox, and deploys spyware capable of full surveillance. Persistence is achieved through system daemons, signed binaries, and stealthy start-up entries, techniques similar to those used by Pegasus.

Timeline of Discovery

  • Late May 2025: Threat Intelligence researchers notice suspicious WhatsApp traffic anomalies.

  • Early June 2025: WhatsApp privately notifies roughly 200 users of possible spyware targeting.

  • August 29, 2025: Meta confirms active zero-day exploitation.

  • August 30, 2025: Apple and WhatsApp release emergency security patches for all platforms.

  • September 2025 (Ongoing): Forensics teams investigate spyware vendor attribution and infrastructure.

Global Impact

This operation appears to be state-sponsored espionage focused on high-value individuals like journalists, NGO workers, and dissidents. The spyware achieves full system access on both iPhones and Macs, and its stealth capabilities make it nearly impossible to detect without forensic-level tools.

The attack demonstrates that even fully patched devices are vulnerable to sophisticated zero-click chains and highlights how messaging platforms have become a primary espionage vector.

Researchers and Organizations Involved

The vulnerabilities and campaign were jointly analyzed by multiple security teams. WhatsApp’s internal security division detected the malicious sync messages, while Apple engineers developed mitigations for the ImageIO memory corruption issue. Threat intelligence teams from The Citizen Labarrow-up-right, CrowdStrikearrow-up-right, Lookoutarrow-up-right , SentinelOnearrow-up-right, and CERT/CC all contributed analysis, confirming spyware activity in the wild.

Exploit Anatomy

This campaign is notable for its low complexity for attackers and high sophistication in execution. The zero-click nature of the exploit means attackers can compromise devices without tricking users. Messages carrying payloads leave no visible logs, making detection incredibly difficult. Persistence is maintained through stealthy launch agents, system daemons, and code-signing abuse, while advanced obfuscation techniques help the spyware evade antivirus tools and mobile security products.

Defensive Strategies

For End Users

  1. Update WhatsApp to the latest versions (iOS v2.25.21.73, macOS v2.25.21.78).

  2. Apply all Apple emergency security updates.

  3. Enable Lockdown Mode on iPhones and Macs if you are a high-risk user.

  4. Audit linked devices regularly and avoid unnecessary device-linking.

  5. If notified by WhatsApp of a targeted attack, perform a full DFU restore and rotate all credentials.

For Organizations

  1. Deploy Mobile Device Management (MDM) solutions to enforce patch compliance.

  2. Monitor WhatsApp sync traffic patterns for anomalies.

  3. Use Endpoint Detection and Response (EDR) with memory forensic capabilities.

  4. Establish incident response playbooks for spyware targeting scenarios.

  5. Partner with threat intelligence providers for early warning and attack indicators.

For Developers & Security Engineers

  • Harden all message and file parsing logic as if hostile by default.

  • Use sandboxing and memory-safe languages for components like image parsers.

  • Run continuous fuzz testing against image libraries such as ImageIO.

  • Offer bug bounties to incentivize early discovery of synchronization and parsing flaws.

Why This Zero-Day Matters

This attack shows that user caution is not enough against modern spyware campaigns. The zero-click vector bypasses phishing protections entirely, leaving even tech-savvy individuals exposed. It reinforces that:

  • Messaging apps are a prime target for advanced actors.

  • Nation-state tradecraft continues to evolve faster than defensive tools.

  • Apple’s Lockdown Mode and rapid patch deployment are critical for journalists and activists.

  • Continuous fuzzing and security testing of media libraries is essential to prevent repeat exploits.

References

Last updated

Was this helpful?