WhatsApp has rolled out a crucial security fix for a vulnerability in its iOS and Mac apps that was actively exploited to compromise the devices of “specific targeted users.”
The flaw tracked as CVE-2025-55177 has now been patched, according to a security advisory from the Meta-owned platform. Apple had already addressed a related bug, identified as CVE-2025-43300, which was used in combination with the WhatsApp exploit as part of what the company described as a “very sophisticated attack against specific targeted individuals.”
In a post on X (formerly Twitter), Donncha Ó Cearbhaill, head of Amnesty International’s Security Lab, revealed that the campaign lasted for nearly 90 days starting late May and involved an “advanced spyware operation.” One of the exploited flaws enabled a zero-click attack allowing hackers to compromise devices without any interaction from the victim.
Ó Cearbhaill further explained that the attack chain leveraged WhatsApp as a delivery method to steal sensitive data from iPhones including personal messages. WhatsApp has since issued warning notifications to affected users, though the identities of the attackers or spyware vendors behind the campaign remain unknown
Meanwhile, Meta spokesperson Margarita Franklin confirmed to TechCrunch that the vulnerability had been patched “a few weeks ago” and fewer than 200 WhatsApp users were notified. However, she declined to provide details on who was behind the operation.
This is not the first time WhatsApp has been targeted in government-linked spyware operations. In May, a U.S. court ordered Israeli spyware company NSO Group to pay WhatsApp $167 million in damages over its 2019 Pegasus spyware campaign, which infected more than 1,400 devices.
Earlier in 2024, WhatsApp also blocked a spyware campaign that targeted about 90 individuals, including journalists and civil society members in Italy. While the Italian government denied involvement, spyware maker Paragon later suspended Italy’s access to its surveillance tools.
Answer. WhatsApp patched a critical flaw tracked as CVE-2025-55177, which was exploited in a zero-click spyware attack targeting specific users. Apple had also addressed a related bug (CVE-2025-43300) used in the same attack chain.
Answer. The attack used zero-click techniques, meaning devices were compromised without any user interaction. It targeted fewer than 200 individuals, including those with sensitive data on iPhones, and lasted nearly 90 days starting in late May.
Answer. Yes. In 2019, WhatsApp won a $167 million judgment against NSO Group over the Pegasus spyware. Earlier in 2024, it blocked another campaign targeting journalists and civil society members in Italy.
Highlights 5 Netflix Movies That Make Your Child Smarter - My Octopus Teacher; The Boy,…
Highlights Huawei Launches On April 20 - Huawei will unveil the Pura 90 series with…
Highlights Redmi K Pad 2 leak reveals an 8.8″ 3K LCD, 165Hz refresh rate, 1100…
Highlights iPhone 18 Pro Colours leak suggests four options including Dark Cherry, Light Blue, Dark…
Highlights Best 5G Phones - Redmi A7 Pro 5G, Tecno Spark Go 5G, POCO C85…
Highlights The Redmi A7 Series is set to debut in India on April 21, 2026.…
This website uses cookies.