
A widespread malware campaign targeting iPhone users has escalated, with security experts warning of a surge in fraudulent schemes designed to steal banking credentials and personal data. The threat, identified as “Infostealer,” disguises itself as browser updates and has compromised over 26 million Apple devices since 2023, according to Kaspersky data cited by cybersecurity analyst Kurt Knutsson1. The malware grants attackers full access to passwords, financial details, and device data, often delivered via phishing emails or fake update prompts.
Infostealer Malware: Tactics and Impact
The Infostealer campaign exploits social engineering tactics, primarily through fake browser update pop-ups. Victims are redirected to malicious domains mimicking legitimate software updates, such as those for Safari or Chrome. Once installed, the malware harvests credentials stored in Keychain, autofill data, and even intercepts 2FA codes sent via SMS2. The DailyMail reported a 55% increase in infections from 2023 (16.49M) to 2024 (25M+), with attackers increasingly targeting mobile banking apps3.
Zero-Click and NFC-Based Threats
Parallel to Infostealer, Chinese-linked threat groups have deployed NFC-based malware like “SuperCard X,” which drains bank accounts via contactless payment exploits. The FBI documented 19 billion spam texts in February 2025 alone, many impersonating toll services (.TOP domains)4. Additionally, zero-click attacks via iMessage—similar to the Pegasus spyware—have resurfaced, corrupting devices through malicious .GIF or PDF attachments without user interaction5.
Mitigation Strategies
The NSA and FCC recommend the following actions to mitigate risks:
- Update Verification: Manually check for updates via Settings > General > Software Update—never through pop-ups.
- Network Hygiene: Disable Bluetooth/NFC in public; use VPNs on untrusted Wi-Fi.
- Behavioral Controls: Reboot devices weekly to disrupt persistent malware.
For enterprises, enforcing MDM policies to restrict sideloading and monitoring for anomalous transaction patterns is critical6.
Relevance to Security Professionals
This campaign underscores the need for enhanced endpoint detection on iOS devices, traditionally perceived as low-risk. Indicators of compromise (IoCs) include unexpected battery drain, unexplained data transfers, and new certificates in device profiles. Network telemetry should flag connections to known C2 IPs linked to the .TOP domain cluster7.
For threat hunters, analyzing plist files in /var/mobile/Library/Preferences/
for suspicious entries and monitoring nsurlsessiond
processes for data exfiltration attempts is advised. Kaspersky’s report notes that Infostealer variants often masquerade as com.apple.WebKit
processes1.
Conclusion
The convergence of social engineering and technical exploits in these campaigns highlights evolving mobile threats. Organizations should prioritize patching legacy iOS versions (pre-15.6.1) and educate users on recognizing fraudulent update prompts. The FBI’s IC3 portal remains a key resource for reporting incidents8.
References
- [1] “iPhone hacked: Apple warning as 26M users targeted by Infostealer malware,” Express.co.uk, Mar. 13, 2025. [Online]. Available: https://www.express.co.uk/news/uk/2026531/iphone-hacked-apple-warning
- [2] “Urgent warning as devices hacked by vicious malware to steal bank cards and passwords,” DailyMail.com, Mar. 14, 2025. [Online]. Available: https://www.dailymail.co.uk/sciencetech/article-14492805/urgent-warning-devices-hacked-vicious-malware-bank-cards-passwords.html
- [3] “iPhone and Android users bombarded by Chinese attack—do not ignore FBI warning,” Forbes, Mar. 23, 2025. [Online]. Available: https://www.forbes.com/sites/zakdoffman/2025/03/23/iphone-android-users-bombarded-by-chinese-attack-do-not-ignore-fbi-warning/
- [4] “Android users warned as bank accounts emptied in scam,” The Sun, Apr. 21, 2025. [Online]. Available: https://www.thesun.co.uk/tech/34568317/android-bank-empty-scam-urgent-warning/
- [5] “Apple spyware warning: Update your iPhone now,” Yahoo Finance, Sep. 13, 2021. [Online]. Available: https://au.finance.yahoo.com/news/apple-spyware-warning-update-005410632.html
- [6] “NSA Mobile Device Best Practices,” NSA, 2025. [Online]. Available: https://s3.documentcloud.org/documents/21018353/nsa-mobile-device-best-practices.pdf