{"id":146424,"date":"2019-08-08T21:23:29","date_gmt":"2019-08-08T21:23:29","guid":{"rendered":"http:\/\/sftarticles.wpenginepowered.com\/en\/?p=146424"},"modified":"2025-07-01T21:35:55","modified_gmt":"2025-07-02T04:35:55","slug":"iphones-hacked-by-text","status":"publish","type":"post","link":"https:\/\/cms-articles.softonic.io\/en\/iphones-hacked-by-text\/","title":{"rendered":"iPhones can be hacked just by receiving a text"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-146447\" src=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2021\/06\/700_iphone_hack_d8tcxl.jpg\" alt=\"iPhone\" width=\"700\" height=\"394\" \/><\/p>\n<p>We&#8217;ve all had close calls when it comes to getting our phones hacked.<\/p>\n<p>Sometimes we click on a malicious link while browsing the internet. Sometimes we download a shady app that is <a href=\"https:\/\/en.softonic.com\/articles\/iphone-trackers-sending-data\" target=\"_blank\" rel=\"noopener noreferrer\">sending data in the background<\/a>. <strong>All of these things typically boil down to our own human error<\/strong>\u00a0whether it be from lack of knowledge, or taking a chance on a shady app. However, it was recently discovered that <strong>an iPhone can be hacked simply by receiving an iMessage.\u00a0<\/strong>This has brought more attention to <strong>a\u00a0 relatively new type of hacking tool known as &#8220;interaction-less&#8221; bugs.<\/strong><\/p>\n<h2>Should I be worried?<\/h2>\n<p>At the <a href=\"https:\/\/www.blackhat.com\/us-19\/\" target=\"_blank\" rel=\"noopener noreferrer\">Black Hat Security Conference<\/a> this week, a Google Project Zero researcher showed that there are &#8220;interaction-less&#8221; bugs in iMessage<a href=\"https:\/\/googleprojectzero.blogspot.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"> that hackers can exploit to gain control<\/a>. <strong>Once hackers gain control, they will be able to access your personal data on your phone.<\/strong><\/p>\n<p>You can <a href=\"https:\/\/i.blackhat.com\/USA-19\/Wednesday\/us-19-Silvanovich-Look-No-Hands-The-Remote-Interactionless-Attack-Surface-Of-The-iPhone.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">click here to see the researcher&#8217;s full slideshow presentation.\u00a0<\/a><\/p>\n<p>The bugs were found by looking for flaws while reverse engineering iMessage. The researcher, Natalie Silvanovich, did not find any similar bugs in Android phones. However, throughout the years, <strong>she and her team have found similar bugs in apps like WhatsApp and FaceTime.\u00a0<\/strong><\/p>\n<div class=\"sc-card-starred-link\">\r\n  <div class=\"sc-card-starred-link__body\">\r\n    <div class=\"sc-card-starred-link__row clearfix\">\r\n      <div class=\"sc-card-starred-link__col-logo\">\r\n        <img decoding=\"async\" class=\"sc-card-starred-link__img\" src=\"https:\/\/articles-img.sftcdn.net\/image\/upload\/q_auto:eco\/v1559662280\/editorial\/privacy_lock_192.webp\" width=\"100px\" height=\"100px\">\r\n      <\/div>\r\n      <div class=\"sc-card-starred-link__col-title\">\r\n        <p class=\"sc-card-starred-link__title\">Ultimate Online Privacy Guide<\/p>\r\n        <a class=\"sc-card-starred-link__button\" href=\"https:\/\/en.softonic.com\/articles\/online-privacy-guide\" target=\"_blank\" rel=\"noopener noreferrer sponsored\">Read Now \u25ba<\/a>\r\n      <\/div>\r\n    <\/div>\r\n    <a class=\"sc-card-starred-link__link\" href=\"https:\/\/en.softonic.com\/articles\/online-privacy-guide\" target=\"_blank\" rel=\"noopener noreferrer sponsored\"><\/a>\r\n  <\/div>\r\n<\/div>\n<h2>What should I do?<\/h2>\n<p><strong>The best thing you can do is to make sure you are updating your phone whenever you can.<\/strong> According to Silvanovich, <strong>Apple has already patched six of these bugs in updates.\u00a0<\/strong><\/p>\n<p>You should also run regular virus scans on your phone to make sure that you are virus-free. We highly recommend using Malwarebytes since it is both free and efficient.<\/p>\n<div class=\"sc-card-program\">\r\n  <div class=\"sc-card-program__body\">\r\n    <div class=\"sc-card-program__row clearfix\">\r\n      <div class=\"sc-card-program__col-logo\">\r\n        <img decoding=\"async\" class=\"sc-card-program__img\" alt=\"Malwarebytes\" src=\"https:\/\/images.sftcdn.net\/images\/t_app-logo-l,f_auto,dpr_auto\/p\/04cdb438-96d1-11e6-ac69-00163ed833e7\/2013167558\/malwarebytes-anti-malware-logo.png\" width=\"100px\" height=\"100px\">\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-title\">\r\n        <span class=\"sc-card-program__title\">Malwarebytes<\/span>\r\n        <a class=\"sc-card-program__button sc-card-program-internal\" href=\"https:\/\/malwarebytes-anti-malware.en.softonic.com\/\" target=\"_self\" rel=\"noopener noreferrer\">Download now \u25ba<\/a>\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-rating\">\r\n        <svg class=\"rating-score__content\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.1\" x=\"0\" y=\"0\" viewbox=\"0 0 50 50\" enable-background=\"new 0 0 50 50\" xml:space=\"preserve\"><path class=\"rating-score__background rating-score--good\" fill=\"none\" stroke-width=\"6\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><path class=\"rating-score__value rating-score__value--80\" fill=\"none\" stroke-width=\"6\" stroke-dashoffset=\"80\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><text class=\"rating-score__number\" content=\"8\" text-anchor=\"middle\" transform=\"matrix(1 0 0 1 25 31.0837)\" data-auto=\"app-user-score\">8<\/text><\/svg>\r\n      <\/div>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <span class=\"sc-card-program__description\"><\/span>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <img decoding=\"async\" class=\"sc-card-program__bigpic\" src=\"\" onerror=\"this.style.display='none'\">\r\n    <\/div>\r\n    <a class=\"sc-card-program__link track-link sc-card-program-internal\" href=\"https:\/\/malwarebytes-anti-malware.en.softonic.com\/\" target=\"_self\" rel=\"noopener noreferrer\"><\/a>\r\n  <\/div>\r\n<\/div>\n<p><strong>You can also block texts from unknown numbers so that you won&#8217;t hear from them again.<\/strong> To do this, follow these steps:<\/p>\n<p>1. Go to the Messages app<\/p>\n<p>2. Tap on the spam message you received to open it<\/p>\n<p>3. Tap at the top of your phone until the &#8220;Info&#8221; button appears.&#8221; Tap &#8220;Info&#8221;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-146451\" src=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2021\/06\/info_obo4uq.jpg\" alt=\"Click info\" width=\"350\" height=\"583\" \/><\/p>\n<p>4. Tap on the number at the top of the screen<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-146453\" src=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2021\/06\/click_number_zf2s8j.jpg\" alt=\"Click number\" width=\"350\" height=\"413\" \/><\/p>\n<p>5. Scroll down to the bottom, and tap &#8220;Block this Caller&#8221;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-146454\" src=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2021\/06\/block_t0ct4z.jpg\" alt=\"Block this Caller\" width=\"350\" height=\"623\" \/><\/p>\n<p>6. You should stop receiving texts from this number altogether<\/p>\n<p><strong>If you do receive a shady text from an unknown number, you should block the caller, and then run Malwarebytes.\u00a0<\/strong>Once you&#8217;re done, check and make sure that your phone is up to date.<\/p>\n<h2>Wrapping up<\/h2>\n<p>Although<strong> there is virtually no chance that your up-to-date iPhone will be hacked through this method,<\/strong> the question now remains: <strong>&#8220;How did Apple leave this vulnerability in the first place?&#8221;<\/strong> If you&#8217;re spending hundreds of dollars on an iPhone, you should rest assured that it won&#8217;t be easy for a hacker to access your personal data. Just recognize that your security depends on your vigilence.<\/p>\n<div class=\"sc-related-articles-white\">\r\n<p class=\"sc-related-articles-white__title\">Read more<\/p>\r\n  <div class=\"sc-related-articles-white__row\">\r\n    <a title=\"New scam spotted on the Google Play Store \u25ba\" href=\"https:\/\/en.softonic.com\/articles\/google-play-store-scam-app\">\r\n    <div class=\"sc-related-articles-white__article\">\r\n      <div class=\"sc-related-articles-white__image\">\r\n        <div style=\"background-image:url(https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2018\/08\/google-play-192.jpg)\"><\/div>\r\n      <\/div>\r\n      <div class=\"sc-related-articles-white__text\">\r\n        <p>New scam spotted on the Google Play Store \u25ba<\/p>\r\n      <\/div>\r\n    <\/div>\r\n    <\/a>\r\n    <a title=\"Security alert: new Netflix phishing scams \u25ba\" href=\"https:\/\/en.softonic.com\/articles\/security-alert-new-netflix-phishing-scams\">\r\n    <div class=\"sc-related-articles-white__article\">\r\n      <div class=\"sc-related-articles-white__image\">\r\n        <div style=\"background-image:url(https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2019\/02\/netflix-logo-192.jpg)\"><\/div>\r\n      <\/div>\r\n      <div class=\"sc-related-articles-white__text\">\r\n        <p>Security alert: new Netflix phishing scams \u25ba<\/p>\r\n      <\/div>\r\n    <\/div>\r\n    <\/a>\r\n  <\/div>\r\n  <div class=\"sc-related-articles-white__row\">\r\n    <a title=\"This ingenious phishing scam is targeting iPhone users \u25ba\" href=\"https:\/\/en.softonic.com\/articles\/iphone-phishing\">\r\n    <div class=\"sc-related-articles-white__article\">\r\n      <div class=\"sc-related-articles-white__image\">\r\n        <div style=\"background-image:url(https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2018\/10\/iphone-192.jpg)\"><\/div>\r\n      <\/div>\r\n      <div class=\"sc-related-articles-white__text\">\r\n        <p>This ingenious phishing scam is targeting iPhone users \u25ba<\/p>\r\n      <\/div>\r\n    <\/div>\r\n    <\/a>\r\n    <a title=\"New year, new scams: what to watch out for in 2019 \u25ba\" href=\"https:\/\/en.softonic.com\/articles\/online-scams-in-2019\">\r\n    <div class=\"sc-related-articles-white__article\">\r\n      <div class=\"sc-related-articles-white__image\">\r\n        <div style=\"background-image:url(https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2018\/12\/phishing-scam-hacker-malware-192.jpg)\"><\/div>\r\n      <\/div>\r\n      <div class=\"sc-related-articles-white__text\">\r\n        <p>New year, new scams: what to watch out for in 2019 \u25ba<\/p>\r\n      <\/div>\r\n    <\/div>\r\n    <\/a>\r\n  <\/div>\r\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>This bug can allow hackers access to all of your personal data just by receiving an iMessage!<\/p>\n","protected":false},"author":9180,"featured_media":146438,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wpcf-pageviews":0},"categories":[1015],"tags":[1082,1066,2216,1472,1405,1624,1027,1043],"usertag":[],"vertical":[],"content-category":[],"class_list":["post-146424","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-android","tag-apple","tag-hackers","tag-hacking","tag-iphone","tag-privacy","tag-security","tag-whatsapp"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/146424","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/users\/9180"}],"replies":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/comments?post=146424"}],"version-history":[{"count":1,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/146424\/revisions"}],"predecessor-version":[{"id":325601,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/146424\/revisions\/325601"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media\/146438"}],"wp:attachment":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media?parent=146424"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/categories?post=146424"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/tags?post=146424"},{"taxonomy":"usertag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/usertag?post=146424"},{"taxonomy":"vertical","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/vertical?post=146424"},{"taxonomy":"content-category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/content-category?post=146424"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}