{"id":38126,"date":"2020-11-11T14:41:19","date_gmt":"2020-11-11T14:41:19","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/31748\/Mysterious-Bugs-Were-Used-To-Hack-iPhones-and-Android-Phones-And-No-One-Will-Talk-About-It.html"},"modified":"2020-11-11T14:41:19","modified_gmt":"2020-11-11T14:41:19","slug":"mysterious-bugs-were-used-to-hack-iphones-and-android-phones-and-no-one-will-talk-about-it","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/mysterious-bugs-were-used-to-hack-iphones-and-android-phones-and-no-one-will-talk-about-it\/","title":{"rendered":"Mysterious Bugs Were Used To Hack iPhones and Android Phones And No One Will Talk About It"},"content":{"rendered":"<div readability=\"32\">\n<div><picture class=\"responsive-image lazyloader--lazy lazyloader--lowres\"><source media=\"(min-width: 1000px)\" srcset=\"https:\/\/video-images.vice.com\/\/articles\/5faabb7bc56809009d4fbedd\/lede\/1605026328855-hacked-phone-worm.png?crop=1xw:1xh;center,center&amp;resize=20:*\"><source media=\"(min-width: 700px)\" srcset=\"https:\/\/video-images.vice.com\/\/articles\/5faabb7bc56809009d4fbedd\/lede\/1605026328855-hacked-phone-worm.png?crop=1xw:1xh;center,center&amp;resize=20:*\"><source media=\"(min-width: 0px)\" srcset=\"https:\/\/video-images.vice.com\/\/articles\/5faabb7bc56809009d4fbedd\/lede\/1605026328855-hacked-phone-worm.png?crop=1xw:1xh;center,center&amp;resize=20:*\"><img class=\"responsive-image__img\" alt=\"hacked-phone-worm\"><\/picture><\/div>\n<p>Image: Cathryn Virginia\/VICE<\/p>\n<\/div>\n<div data-component=\"BodyComponentRenderer\" readability=\"99.102850162866\"><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"32.738764044944\"><\/p>\n<p>Google&#8217;s elite teams of bug and malware hunters found and disclosed a flurry of high impact vulnerabilities in <a href=\"https:\/\/twitter.com\/benhawkes\/status\/1323374326150701057\">Chrome<\/a>, <a href=\"https:\/\/twitter.com\/benhawkes\/status\/1323374326150701057\">Android<\/a>, <a href=\"https:\/\/twitter.com\/benhawkes\/status\/1322206828202127360\">Windows<\/a>, and <a href=\"https:\/\/twitter.com\/benhawkes\/status\/1324422885830610944\">iOS<\/a> last week. The internet giant also said that these various vulnerabilities were all &#8220;actively exploited in the wild.&#8221; In other words, hackers were using these bugs to actually hack people, which is concerning.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"36\"><\/p>\n<p>What&#8217;s more, all these vulnerabilities are in some way related to each other, Motherboard has learned. That potentially means the same hackers were using them. According to the disclosure reports, some bugs were in font libraries, and others were used to escape the sandbox in Chrome, and others were used to take control of the whole system, suggesting some of these bugs were part of a chain of vulnerabilities used to exploit victim&#8217;s devices.&nbsp;&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"35\"><\/p>\n<p>So far, very little information has come out about who may have been using the exploits and who they were targeting. Often, bugs in modern software are found and are ethically disclosed by security researchers, which means that they are fixed before they are widely exploited to hack people. In this case, however, we know that the bugs were being used for hacking operations.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"18.7\"><\/p>\n<p>Last year, <a href=\"https:\/\/www.vice.com\/en\/article\/qvgv4p\/apple-disputes-googles-claims-of-a-devastating-iphone-hack\">Google found a series of zero-days<\/a>\u2014vulnerabilities that at the time of discovery are unknown to the software maker\u2014that spies were using to target the Uighur community. China <a href=\"https:\/\/www.vice.com\/en\/article\/8xz3qg\/they-come-for-us-at-night-inside-chinas-hidden-war-on-muslim-uighurs\">has conducted a widespread, systemic campaign of physical and technical oppression and surveillance<\/a> against the Muslim minority.&nbsp;<\/p>\n<p><\/span><\/p>\n<blockquote data-component=\"QuoteBlock\" class=\"abc__quote abc__quote--pullquote\" readability=\"5\">\n<p>&#8220;This feels like spy shit.&#8221;<\/p>\n<\/blockquote>\n<p><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"38\"><\/p>\n<p>Unfortunately, this time we don&#8217;t know any details because Google\u2014the only company that has the whole story behind these bugs\u2014has not said much at all about how it found the bugs, who was using them, and whom they were being used against. Notably, an update pushed to iOS 12 (which is two years old) patched the issue on phones dating back to the iPhone 5s and iPhone 6. Often, when updates are pushed to such old devices it means the bug is particularly bad, but, again, we do not know the specifics at this time.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"30\"><\/p>\n<p>&#8220;The fact that they updated iPhone 6 users means it was bad,&#8221; said a cybersecurity expert who asked not to be named because he wasn&#8217;t allowed to speak to the press. &#8220;That phone has been end of life for a while.&#8221;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"29\"><\/p>\n<p>&#8220;We&#8217;re not going to be able to offer much new info,&#8221; Google spokesperson Scott Westover said in an email on Monday.<\/p>\n<p><\/span><\/p>\n<blockquote data-component=\"QuoteBlock\" class=\"abc__quote abc__quote--blockquote\" readability=\"12.271028037383\">\n<p><em><strong>Do you have any information on these vulnerabilities, or the hackers who used them? We&#8217;d love to hear from you. Using a non-work phone or computer, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, on Wickr at lorenzofb, OTR chat at lorenzofb@jabber.ccc.de, or email<\/strong><\/em> <a href=\"mailto:lorenzofb@vice.com\">lorenzofb@vice.com<\/a><em><strong>.<\/strong><\/em><\/p>\n<\/blockquote>\n<p><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"32\"><\/p>\n<p>Apple did not respond to requests for comment. A Microsoft spokesperson said in an email that the company \u201creleased security updates in November to address CVE-2020-17087. Customers who have applied the updates, or have automatic updates enabled, are protected.\u201d The company also said that it has not seen evidence of exploitation in the wild.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"18.701298701299\"><\/p>\n<p>Ben Hawkes, the head of Google Project Zero, <a href=\"https:\/\/www.vice.com\/en\/article\/59nyqb\/how-google-changed-the-secretive-market-for-the-most-dangerous-hacks-in-the-world\">the internet giant&#8217;s team of skilled hackers that is tasked with the mission of finding vulnerabilities in all kinds of software<\/a>\u2014not just Google&#8217;s\u2014announced on Twitter over the last 10 days that his team had found all these vulnerabilities (seven in total.)&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"27.133004926108\"><\/p>\n<p>On Oct. 20, Google disclosed the first bug (<a href=\"https:\/\/crbug.com\/1139963\">CVE-2020-15999<\/a>) in this series of vulnerabilities, a bug in <a href=\"https:\/\/www.freetype.org\/freetype2\/docs\/index.html#:~:text=FreeType%20is%20a%20software%20font,many%20other%20products%20as%20well.\">FreeType<\/a>, an open source font rendering software, was used to target Chrome, <a href=\"https:\/\/twitter.com\/benhawkes\/status\/1318640422571266048\">according to Hawkes<\/a>.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"24.358208955224\"><\/p>\n<p>Then, on Oct. 30, the first bug (CVE-2020-17087) to gather more attention in the press was <a href=\"https:\/\/arstechnica.com\/information-technology\/2020\/10\/googles-project-zero-discloses-windows-0day-thats-been-under-active-exploit\/\">a Windows bug that allowed hackers to escalate system privileges<\/a>, meaning the hackers could jump from having control of one app to taking control of the whole victim&#8217;s system.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"32.48275862069\"><\/p>\n<p>Finally, last week, Hawkes <a href=\"https:\/\/twitter.com\/benhawkes\/status\/1323374326150701057\">wrote<\/a> on Twitter that Project Zero had also found zero-days for Chrome and Android (CVE-2020-16009 and CVE-2020-16010) that were exploited in the wild. The first one of these was used for &#8220;remote code execution,&#8221; technical jargon for hackers taking full control of an application or system.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"31.112068965517\"><\/p>\n<p>Just three days later, Hawkes <a href=\"https:\/\/twitter.com\/benhawkes\/status\/1324422885830610944\">announced<\/a> that Apple <a href=\"https:\/\/www.cyberscoop.com\/apple-ios-update-vulnerabilities-exploited-google\/\">had fixed three critical bugs in iOS<\/a>. Two of them in the kernel, the part of the operating system that has access to almost anything that&#8217;s happening on the phone, and one of them was also a font bug, vaguely reminiscent of the FreeType one that was disclosed on Oct. 20. This bug, <a href=\"https:\/\/support.apple.com\/en-us\/HT211940\">according to Apple<\/a>, allowed hackers to take control of the victim&#8217;s phone by sending them a file with a &#8220;maliciously crafted font.&#8221;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"32\"><\/p>\n<p>Shane Huntley, the head of Google&#8217;s Threat Analysis Group, a team that tracks hackers all over the internet, said on Twitter that these bugs were used for &#8220;targeted exploitation in the wild similar to the other recently reported 0days&#8221; and that these bugs had nothing to do with the U.S. elections.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"31\"><\/p>\n<p>&#8220;This feels like spy shit,&#8221; Ryan Stortz, a researcher who works the security consultancy firm Trail of Bits, told Motherboard.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"29\"><\/p>\n<p>Stortz said that he has not seen the details of the exploits and vulnerabilities\u2014no one outside of Google and the companies that patched them have\u2014but said that it looks like they could all be part of the same hacker group&#8217;s bug arsenal.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"28\"><\/p>\n<p>&#8220;It&#8217;s pretty damn rare for bugs like this to be cross platform. I think it\u2019s more likely they found another waterhole site like with the Uighur bugs that had both chains.&#8221;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"30\"><\/p>\n<p>All these seven bugs are related to each other, according to a source with knowledge of the vulnerabilities, who asked to remain anonymous as they were not allowed to talk to the press.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"31.818181818182\"><\/p>\n<p>In any case, some of these bugs were very critical and gave hackers a lot of power when they used them. The iOS bugs, for example, were so dangerous that Apple pushed updates not just for <a href=\"https:\/\/support.apple.com\/en-us\/HT211929\">the current iOS 14<\/a>, but also for the older, not usually supported, <a href=\"https:\/\/support.apple.com\/en-us\/HT211940\">iOS 12<\/a>.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"28\"><\/p>\n<p><em>This story was updated with a new statement from Microsoft saying they patched the vulnerability found by Project Zero.<\/em><\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\"><\/span><\/div>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/31748\/Mysterious-Bugs-Were-Used-To-Hack-iPhones-and-Android-Phones-And-No-One-Will-Talk-About-It.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[9035],"class_list":["post-38126","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-blogs","tag-headlinehackerphonegoogleapplezero-day"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Mysterious Bugs Were Used To Hack iPhones and Android Phones And No One Will Talk About It 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/mysterious-bugs-were-used-to-hack-iphones-and-android-phones-and-no-one-will-talk-about-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mysterious Bugs Were Used To Hack iPhones and Android Phones And No One Will Talk About It 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/mysterious-bugs-were-used-to-hack-iphones-and-android-phones-and-no-one-will-talk-about-it\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-11T14:41:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"432\" \/>\n\t<meta property=\"og:image:height\" content=\"435\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mysterious-bugs-were-used-to-hack-iphones-and-android-phones-and-no-one-will-talk-about-it\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mysterious-bugs-were-used-to-hack-iphones-and-android-phones-and-no-one-will-talk-about-it\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Mysterious Bugs Were Used To Hack iPhones and Android Phones And No One Will Talk About It\",\"datePublished\":\"2020-11-11T14:41:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mysterious-bugs-were-used-to-hack-iphones-and-android-phones-and-no-one-will-talk-about-it\\\/\"},\"wordCount\":1071,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"keywords\":[\"headline,hacker,phone,google,apple,zero day\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mysterious-bugs-were-used-to-hack-iphones-and-android-phones-and-no-one-will-talk-about-it\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mysterious-bugs-were-used-to-hack-iphones-and-android-phones-and-no-one-will-talk-about-it\\\/\",\"name\":\"Mysterious Bugs Were Used To Hack iPhones and Android Phones And No One Will Talk About It 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"datePublished\":\"2020-11-11T14:41:19+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mysterious-bugs-were-used-to-hack-iphones-and-android-phones-and-no-one-will-talk-about-it\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mysterious-bugs-were-used-to-hack-iphones-and-android-phones-and-no-one-will-talk-about-it\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mysterious-bugs-were-used-to-hack-iphones-and-android-phones-and-no-one-will-talk-about-it\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,phone,google,apple,zero day\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackerphonegoogleapplezero-day\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Mysterious Bugs Were Used To Hack iPhones and Android Phones And No One Will Talk About It\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mysterious Bugs Were Used To Hack iPhones and Android Phones And No One Will Talk About It 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/mysterious-bugs-were-used-to-hack-iphones-and-android-phones-and-no-one-will-talk-about-it\/","og_locale":"en_US","og_type":"article","og_title":"Mysterious Bugs Were Used To Hack iPhones and Android Phones And No One Will Talk About It 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/mysterious-bugs-were-used-to-hack-iphones-and-android-phones-and-no-one-will-talk-about-it\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-11-11T14:41:19+00:00","og_image":[{"width":432,"height":435,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/mysterious-bugs-were-used-to-hack-iphones-and-android-phones-and-no-one-will-talk-about-it\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/mysterious-bugs-were-used-to-hack-iphones-and-android-phones-and-no-one-will-talk-about-it\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Mysterious Bugs Were Used To Hack iPhones and Android Phones And No One Will Talk About It","datePublished":"2020-11-11T14:41:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/mysterious-bugs-were-used-to-hack-iphones-and-android-phones-and-no-one-will-talk-about-it\/"},"wordCount":1071,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"keywords":["headline,hacker,phone,google,apple,zero day"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/mysterious-bugs-were-used-to-hack-iphones-and-android-phones-and-no-one-will-talk-about-it\/","url":"https:\/\/www.threatshub.org\/blog\/mysterious-bugs-were-used-to-hack-iphones-and-android-phones-and-no-one-will-talk-about-it\/","name":"Mysterious Bugs Were Used To Hack iPhones and Android Phones And No One Will Talk About It 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"datePublished":"2020-11-11T14:41:19+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/mysterious-bugs-were-used-to-hack-iphones-and-android-phones-and-no-one-will-talk-about-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/mysterious-bugs-were-used-to-hack-iphones-and-android-phones-and-no-one-will-talk-about-it\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/mysterious-bugs-were-used-to-hack-iphones-and-android-phones-and-no-one-will-talk-about-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,phone,google,apple,zero day","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerphonegoogleapplezero-day\/"},{"@type":"ListItem","position":3,"name":"Mysterious Bugs Were Used To Hack iPhones and Android Phones And No One Will Talk About It"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38126","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=38126"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38126\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=38126"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=38126"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=38126"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}