Everything you need to know about the Trident iPhone exploit

A new zero-day exploit is doing some pretty nasty things to iPhones

Last night the story broke that a piece of commercially-produced malware had been discovered which would allow someone to remotely take over an iPhone. The malware, dubbed Trident, used three previously undiscovered vulnerabilities in iOS to gain access to the phone and install sophisticated spyware.

What does the iPhone Trident exploit do?

It allows malicious users to remotely jailbreak a phone and install software on it that's hidden from the phone's owner. The malware is triggered by someone visiting a web page - the phone's user doesn't need to agree to download anything. The spyware package allowed its masters to use the phone's camera and microphone to record anything at any time, as well as monitoring chat software such as WhatsApp.

How was the Trident malware discovered?

The malware appears to have been specifically targeted at Ahmed Mansour, a human rights activist in the UAE. Mansour received text messages on his phone which claimed to link to details of human rights abuses. However, he became suspicious of the messages, and passed details on to Citizen Lab, who dissected the malware and linked it to an Israeli company which makes spyware for use by governments.

Who made the Trident malware?

Can the Trident malware affect me?

In theory, yes. In practice, this kind of targeted malware attack is almost always designed to focus on specific users by the government responsible. They also tend to want to keep the malware they use close to their chests because it's a costly piece of software which (ironically) they don't want to get into "the wrong" hands.

It's already been patched

If you're on iOS 9, hit software update and download iOS 9.3.5. This patches the exploits used by the NSO malware, as well as throwing in a few other security fixes into the mix.

Isn't this all pretty shady?

Yes it is. Add together shadowy companies making malware and governments targeting human rights activists for surveillance by hacking and you have something that sounds like it's out of a pacy cyberwar novel. Sadly, it looks like it's not fiction.

Featured Resources

Navigating the new normal: A fast guide to remote working

A smooth transition will support operations for years to come

Download now

Putting a spotlight on cyber security

An examination of the current cyber security landscape

Download now

The economics of infrastructure scalability

Find the most cost-effective and least risky way to scale

Download now

IT operations overload hinders digital transformation

Clearing the path towards a modernised system of agreement

Download now



Best antivirus for Windows 10

30 Jun 2020

Searching for a new job? That LinkedIn job offer may be fake

19 Jun 2020

iPhone 8 vs iPhone SE

5 May 2020

Best smartphone 2019: Apple, Samsung and OnePlus duke it out

27 Apr 2020

Most Popular


How to find RAM speed, size and type

24 Jun 2020

Microsoft releases urgent patch for high-risk Windows 10 flaws

1 Jul 2020
data protection

EU institutions told to avoid Microsoft software after licence spat

3 Jul 2020