Apple Warns 1.8 Billion iPhone Users of WebKit Zero-Days Linked to Pegasus Spyware
Apple issues emergency patches for two WebKit zero-day vulnerabilities being actively exploited in sophisticated attacks linked to NSO Group's Pegasus spyware.
Apple has issued a stark warning to its nearly 1.8 billion iPhone users about sophisticated hacking threats exploiting zero-day vulnerabilities in WebKit, the browser engine that powers Safari and other iOS applications. The flaws are linked to attacks resembling those conducted using NSO Group's infamous Pegasus spyware.
The Vulnerabilities
Two zero-day vulnerabilities in WebKit enable attackers to execute arbitrary code on affected devices. If successfully exploited, attackers could potentially:
- Steal sensitive data from the device
- Conduct unauthorized surveillance
- Achieve complete device compromise
Apple has confirmed these flaws are being actively exploited in targeted attacks, though the company hasn't disclosed specific victim details or attack scope.
Connection to Pegasus
The attack characteristics mirror previous incidents involving Pegasus, the commercial spyware developed by Israel-based NSO Group. Pegasus has a documented history of being used to target journalists, activists, politicians, and business executives worldwide.
While Apple hasn't explicitly attributed these attacks to Pegasus, the sophistication level and targeting profile align with previous NSO Group operations. Apple Security Engineering and Architecture (SEAR) teams collaborated with Google's Threat Analysis Group to identify and track the exploit chain. This follows another WebKit zero-day (CVE-2025-14174) patched in December that was also linked to targeted spyware attacks.
Who Should Be Concerned
While the average iPhone user is unlikely to be targeted by nation-state-level spyware, certain groups face elevated risk:
- Journalists and media workers, particularly those covering sensitive topics
- Human rights activists and NGO personnel
- Politicians and government officials
- Business executives in sensitive industries
- Lawyers handling high-profile or politically sensitive cases
- Individuals in conflict regions or authoritarian states
If you fall into any of these categories, treat this as an urgent patching priority.
Affected Devices
The vulnerabilities affect all devices running WebKit:
- iPhone 8 and later
- iPad Pro (all models)
- iPad Air 3rd generation and later
- iPad 5th generation and later
- iPad mini 5th generation and later
- Mac computers running macOS Ventura, Sonoma, or Sequoia
- Apple Watch Series 4 and later
- Apple TV HD and Apple TV 4K (all models)
Patch Immediately
Apple has released security updates addressing these vulnerabilities:
- iOS 18.2.1 and iPadOS 18.2.1
- macOS Sequoia 15.2.1
- watchOS 11.2.1
- tvOS 18.2.1
- visionOS 2.2.1
To update your iPhone:
- Go to Settings > General > Software Update
- Download and install the available update
- Restart your device when prompted
Lockdown Mode Consideration
For high-risk individuals, Apple's Lockdown Mode provides additional protection against sophisticated attacks. Lockdown Mode significantly restricts device functionality but hardens the attack surface by:
- Blocking most message attachment types
- Disabling link previews
- Blocking incoming FaceTime calls from unknown contacts
- Preventing wired connections with computers when locked
- Restricting web browsing features
To enable Lockdown Mode: Settings > Privacy & Security > Lockdown Mode
The Spyware Industry Problem
This incident underscores the ongoing challenge of commercial spyware proliferation. Despite sanctions, lawsuits, and international condemnation, companies like NSO Group continue operating, and their tools continue appearing in attacks against civil society.
Apple has invested significantly in spyware detection and protection, including:
- Regular security updates addressing zero-days
- Lockdown Mode for high-risk users
- Threat notifications to targeted individuals
- Lawsuits against spyware vendors
Yet the cat-and-mouse game continues. Spyware vendors are well-funded, patient, and continuously developing new exploit chains.
Detection Is Difficult
One challenge with sophisticated spyware: infection often leaves minimal traces. Traditional antivirus tools typically cannot detect Pegasus-level threats. If you believe you may have been targeted:
- Update immediately to the latest iOS version
- Consider professional forensic analysis from organizations like Amnesty Tech or Citizen Lab
- Enable Lockdown Mode if you're in a high-risk category
- Report suspected targeting to organizations tracking spyware abuse
Resources
All Apple device users should update immediately. High-risk individuals should additionally consider enabling Lockdown Mode and seeking security guidance from organizations specializing in digital safety.
Related Articles
Apple Patches WebKit Zero-Days Linked to Spyware Attacks on Targeted Individuals
CVE-2025-14174 and CVE-2025-43529 were exploited in sophisticated attacks before Apple's December 12 emergency patches across iOS, macOS, and Safari.
Dec 26, 2025CVSS 10.0 Zero-Day Hits 70,000 XSpeeder Devices
CVE-2025-54322 enables unauthenticated root RCE on SD-WAN appliances and edge routers. Vendor has ignored seven months of disclosure attempts. No patch available.
Jan 1, 2026Critical n8n Flaw Lets Attackers Execute Code on 100,000+ Instances
CVE-2025-68613 in the workflow automation platform scores CVSS 9.9 with public PoC code now available. Patch to version 1.122.0 immediately.
Dec 24, 2025SonicWall Patches Exploited SMA1000 Zero-Day Used in Chained RCE Attack
CVE-2025-40602 privilege escalation flaw combined with earlier vulnerability enables unauthenticated remote code execution on SonicWall appliances.
Dec 23, 2025