Hackers Breach iPhone via Keilgers in Virtual Keyboard

It was recently discovered that hackers found a way to bypass the iPhone security system using third-party keyboards. According to a report by Russell Kent-Payne from Certo Software, hackers are using these keyboards to record personal messages, browser history, and even passwords of iPhone users.

The investigation into this threat started after numerous reports of cyberstalking. It was found during the investigation that malicious keyboards were installed on all compromised devices.

The default iOS keyboard can be seen on the left, while the user-installed keyboard, which functions as a keylogger, is depicted on the right.

The uniqueness of this attack lies in the fact that hackers do not need to hack the device or gain access to iCloud. Instead, they utilize Apple’s Testflight to distribute the keyboards, as applications on this platform do not undergo the same rigorous security checks as those in the App Store.

Once the malicious keyboard is installed through the device settings, hackers replace the standard iPhone keyboard with their own, which appears identical to the original. This keyboard is capable of recording everything entered by the user and sending the data to the hackers’ servers.

How to Check and Protect Yourself

To check if a malicious keyboard is installed on your iPhone, follow these steps:

  1. Open the settings on your iPhone.
  2. Go to the “Keyboard” section.
  3. Check the list of installed keyboards.
  4. If you find an unfamiliar keyboard with “full access” permission enabled, it may be a cause for concern.
  5. In such cases, it is recommended to remove suspicious keyboards.

It is also worth considering using antivirus software for Mac to scan your iPhone or iPad for any harmful programs. However, please

/Reports, release notes, official announcements.