{"id":54155,"date":"2023-10-16T14:39:00","date_gmt":"2023-10-16T14:39:00","guid":{"rendered":"http:\/\/a028991d-5d66-42f3-bd2f-bd174de122db"},"modified":"2023-10-16T14:39:00","modified_gmt":"2023-10-16T14:39:00","slug":"flipper-zero-can-be-used-to-crash-iphones-running-ios-17-but-theres-a-way-to-foil-the-attack","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/flipper-zero-can-be-used-to-crash-iphones-running-ios-17-but-theres-a-way-to-foil-the-attack\/","title":{"rendered":"Flipper Zero can be used to crash iPhones running iOS 17, but there&#8217;s a way to foil the attack"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large c-shortcodeImage-hasCaption\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage c-cmsImage_loaded\"><source media=\"(max-width: 767px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/8c5bc3f5ab3bf7ec3acad50576a4d1a0db01f2cd\/2023\/10\/14\/367e5940-7184-482e-a941-9c948b8bc119\/img-6360.jpg?auto=webp&amp;width=768\" alt=\"Flipper Zero can carry out a denial of service attach on iPhones running the latest iOS 17\"><source media=\"(max-width: 1023px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/95fb297f098197873f307dba83884f7d6fe50f8d\/2023\/10\/14\/367e5940-7184-482e-a941-9c948b8bc119\/img-6360.jpg?auto=webp&amp;width=1024\" alt=\"Flipper Zero can carry out a denial of service attach on iPhones running the latest iOS 17\"><source media=\"(max-width: 1440px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/78bdcebee90518fc7b0095decf491f67a339f39d\/2023\/10\/14\/367e5940-7184-482e-a941-9c948b8bc119\/img-6360.jpg?auto=webp&amp;width=1280\" alt=\"Flipper Zero can carry out a denial of service attach on iPhones running the latest iOS 17\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/78bdcebee90518fc7b0095decf491f67a339f39d\/2023\/10\/14\/367e5940-7184-482e-a941-9c948b8bc119\/img-6360.jpg?auto=webp&amp;width=1280\" alt=\"Flipper Zero can carry out a denial of service attach on iPhones running the latest iOS 17\" width=\"1280\" height=\"720\" fetchpriority=\"low\"><\/picture><\/div>\n<\/p><\/div>\n<p> <!----><figcaption>\n<div class=\"c-shortcodeImage_caption g-inner-spacing-right-small g-color-black\" readability=\"6\">\n<div class=\"c-ShortcodeContent\" readability=\"32\">\n<p>Flipper Zero can carry out a denial of service attach on iPhones running the latest iOS 17<\/p>\n<\/div>\n<\/div>\n<p> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">Adrian Kingsley-Hughes\/ZDNET<\/span><\/figcaption><\/figure>\n<p>The <a href=\"https:\/\/www.zdnet.com\/article\/flipper-zero-geeky-toy-or-serious-security-tool\/\" rel=\"follow\">Flipper Zero<\/a> can do a lot, but I wasn&#8217;t expecting it to be able to be able to lock up an iPhone using nothing more than Bluetooth.<\/p>\n<p>But it turns out it can do just that.<\/p>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/article\/flipper-zero-just-went-even-more-retro-with-this-cool-limited-edition-version\/\" rel=\"follow\">Flipper Zero just went even more retro with this cool limited-edition version<\/a><\/strong><\/p>\n<p>Now, you can&#8217;t do this with a stock Flipper Zero. If you want to test this out, you&#8217;ll need to have a Flipper Zero and then load an early developer build of <a href=\"https:\/\/github.com\/Flipper-XFW\/Xtreme-Firmware\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"c-regularLink\">Xtreme third-party firmware<\/a> onto it.<\/p>\n<p>From there it&#8217;s a matter of firing up an app called Apple BLE Spam and choosing an attack called Lockup Crash.<\/p>\n<p><!----><\/p>\n<p>And it does exactly what it says in the name \u2013 it&#8217;ll lock up and crash the iPhone.<\/p>\n<p>Basically, it performs a denial of service (DoS) attack on iPhones.<\/p>\n<p>ZDNET has tested this and can confirm that it can lock up an iPhone running the <a href=\"https:\/\/www.zdnet.com\/article\/new-iphone-15-pro-overheating-reports-still-too-hot-after-ios-17-0-3-and-fresh-issues-arise-after-the-update\/\" rel=\"follow\">latest iOS 17.0.3<\/a>. The issue does not appear to affect iPhones running iOS 16.<\/p>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/article\/if-you-like-your-flipper-zero-then-youll-love-this\/\" rel=\"follow\">If you like your Flipper Zero, then you&#8217;ll love this<\/a><\/strong><\/p>\n<p>But the Apple BLE Spam app can do more. It can also initiate an array of pairing attacks that are more spammy than causing crashes, but are still annoying to the iPhone user, and at this point it&#8217;s unclear if they could be crafted into a different attack. <\/p>\n<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large c-shortcodeImage-hasCaption\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage\"><!----> <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/flipper-zero-can-lock-up-an-iphone-running-the-latest-ios-17\/\" alt=\"Using Apple BLE Spam to spam an iPhone with popups\" width=\"1280\" height=\"720\" fetchpriority=\"low\"><\/picture><\/div>\n<\/p><\/div>\n<p> <!----><figcaption>\n<div class=\"c-shortcodeImage_caption g-inner-spacing-right-small g-color-black\" readability=\"6\">\n<div class=\"c-ShortcodeContent\" readability=\"32\">\n<p>Using Apple BLE Spam to spam an iPhone with popups<\/p>\n<\/div>\n<\/div>\n<p> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">Adrian Kingsley-Hughes\/ZDNET<\/span><\/figcaption><\/figure>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/article\/7-cool-and-useful-things-to-do-with-your-flipper-zero\/\" rel=\"follow\">7 cool and useful things to do with your Flipper Zero<\/a><\/strong><\/p>\n<p>You&#8217;re probably wondering how best to protect yourself. I can only find one way &#8212; turn off Bluetooth, either by going into Control Center and disabling it there (this only stays off until the next day) or going <strong>Settings &gt; Bluetooth<\/strong> and flipping the toggle there.<\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/flipper-zero-can-lock-up-an-iphone-running-the-latest-ios-17\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It basically performs a denial of service (DoS) attack on iPhones. Here&#8217;s how it works and what you can do to protect your phone.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-54155","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Flipper Zero can be used to crash iPhones running iOS 17, but there&#039;s a way to foil the attack 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/flipper-zero-can-be-used-to-crash-iphones-running-ios-17-but-theres-a-way-to-foil-the-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Flipper Zero can be used to crash iPhones running iOS 17, but there&#039;s a way to foil the attack 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/flipper-zero-can-be-used-to-crash-iphones-running-ios-17-but-theres-a-way-to-foil-the-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-16T14:39:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/78bdcebee90518fc7b0095decf491f67a339f39d\/2023\/10\/14\/367e5940-7184-482e-a941-9c948b8bc119\/img-6360.jpg?auto=webp&amp;width=1280\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/flipper-zero-can-be-used-to-crash-iphones-running-ios-17-but-theres-a-way-to-foil-the-attack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/flipper-zero-can-be-used-to-crash-iphones-running-ios-17-but-theres-a-way-to-foil-the-attack\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Flipper Zero can be used to crash iPhones running iOS 17, but there&#8217;s a way to foil the attack\",\"datePublished\":\"2023-10-16T14:39:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/flipper-zero-can-be-used-to-crash-iphones-running-ios-17-but-theres-a-way-to-foil-the-attack\\\/\"},\"wordCount\":342,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/flipper-zero-can-be-used-to-crash-iphones-running-ios-17-but-theres-a-way-to-foil-the-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/78bdcebee90518fc7b0095decf491f67a339f39d\\\/2023\\\/10\\\/14\\\/367e5940-7184-482e-a941-9c948b8bc119\\\/img-6360.jpg?auto=webp&amp;width=1280\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/flipper-zero-can-be-used-to-crash-iphones-running-ios-17-but-theres-a-way-to-foil-the-attack\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/flipper-zero-can-be-used-to-crash-iphones-running-ios-17-but-theres-a-way-to-foil-the-attack\\\/\",\"name\":\"Flipper Zero can be used to crash iPhones running iOS 17, but there's a way to foil the attack 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/flipper-zero-can-be-used-to-crash-iphones-running-ios-17-but-theres-a-way-to-foil-the-attack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/flipper-zero-can-be-used-to-crash-iphones-running-ios-17-but-theres-a-way-to-foil-the-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/78bdcebee90518fc7b0095decf491f67a339f39d\\\/2023\\\/10\\\/14\\\/367e5940-7184-482e-a941-9c948b8bc119\\\/img-6360.jpg?auto=webp&amp;width=1280\",\"datePublished\":\"2023-10-16T14:39:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/flipper-zero-can-be-used-to-crash-iphones-running-ios-17-but-theres-a-way-to-foil-the-attack\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/flipper-zero-can-be-used-to-crash-iphones-running-ios-17-but-theres-a-way-to-foil-the-attack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/flipper-zero-can-be-used-to-crash-iphones-running-ios-17-but-theres-a-way-to-foil-the-attack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/78bdcebee90518fc7b0095decf491f67a339f39d\\\/2023\\\/10\\\/14\\\/367e5940-7184-482e-a941-9c948b8bc119\\\/img-6360.jpg?auto=webp&amp;width=1280\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/78bdcebee90518fc7b0095decf491f67a339f39d\\\/2023\\\/10\\\/14\\\/367e5940-7184-482e-a941-9c948b8bc119\\\/img-6360.jpg?auto=webp&amp;width=1280\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/flipper-zero-can-be-used-to-crash-iphones-running-ios-17-but-theres-a-way-to-foil-the-attack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Flipper Zero can be used to crash iPhones running iOS 17, but there&#8217;s a way to foil the attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Flipper Zero can be used to crash iPhones running iOS 17, but there's a way to foil the attack 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/flipper-zero-can-be-used-to-crash-iphones-running-ios-17-but-theres-a-way-to-foil-the-attack\/","og_locale":"en_US","og_type":"article","og_title":"Flipper Zero can be used to crash iPhones running iOS 17, but there's a way to foil the attack 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/flipper-zero-can-be-used-to-crash-iphones-running-ios-17-but-theres-a-way-to-foil-the-attack\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-10-16T14:39:00+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/78bdcebee90518fc7b0095decf491f67a339f39d\/2023\/10\/14\/367e5940-7184-482e-a941-9c948b8bc119\/img-6360.jpg?auto=webp&amp;width=1280","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/flipper-zero-can-be-used-to-crash-iphones-running-ios-17-but-theres-a-way-to-foil-the-attack\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/flipper-zero-can-be-used-to-crash-iphones-running-ios-17-but-theres-a-way-to-foil-the-attack\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Flipper Zero can be used to crash iPhones running iOS 17, but there&#8217;s a way to foil the attack","datePublished":"2023-10-16T14:39:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/flipper-zero-can-be-used-to-crash-iphones-running-ios-17-but-theres-a-way-to-foil-the-attack\/"},"wordCount":342,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/flipper-zero-can-be-used-to-crash-iphones-running-ios-17-but-theres-a-way-to-foil-the-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/78bdcebee90518fc7b0095decf491f67a339f39d\/2023\/10\/14\/367e5940-7184-482e-a941-9c948b8bc119\/img-6360.jpg?auto=webp&amp;width=1280","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/flipper-zero-can-be-used-to-crash-iphones-running-ios-17-but-theres-a-way-to-foil-the-attack\/","url":"https:\/\/www.threatshub.org\/blog\/flipper-zero-can-be-used-to-crash-iphones-running-ios-17-but-theres-a-way-to-foil-the-attack\/","name":"Flipper Zero can be used to crash iPhones running iOS 17, but there's a way to foil the attack 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/flipper-zero-can-be-used-to-crash-iphones-running-ios-17-but-theres-a-way-to-foil-the-attack\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/flipper-zero-can-be-used-to-crash-iphones-running-ios-17-but-theres-a-way-to-foil-the-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/78bdcebee90518fc7b0095decf491f67a339f39d\/2023\/10\/14\/367e5940-7184-482e-a941-9c948b8bc119\/img-6360.jpg?auto=webp&amp;width=1280","datePublished":"2023-10-16T14:39:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/flipper-zero-can-be-used-to-crash-iphones-running-ios-17-but-theres-a-way-to-foil-the-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/flipper-zero-can-be-used-to-crash-iphones-running-ios-17-but-theres-a-way-to-foil-the-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/flipper-zero-can-be-used-to-crash-iphones-running-ios-17-but-theres-a-way-to-foil-the-attack\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/78bdcebee90518fc7b0095decf491f67a339f39d\/2023\/10\/14\/367e5940-7184-482e-a941-9c948b8bc119\/img-6360.jpg?auto=webp&amp;width=1280","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/78bdcebee90518fc7b0095decf491f67a339f39d\/2023\/10\/14\/367e5940-7184-482e-a941-9c948b8bc119\/img-6360.jpg?auto=webp&amp;width=1280"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/flipper-zero-can-be-used-to-crash-iphones-running-ios-17-but-theres-a-way-to-foil-the-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Flipper Zero can be used to crash iPhones running iOS 17, but there&#8217;s a way to foil the attack"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/54155","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=54155"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/54155\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=54155"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=54155"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=54155"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}