
The world of mobile security faces a severe new threat with the emergence of a highly advanced spyware campaign. This sophisticated intrusion, potentially dubbed Graphite, is delivered through zero-click exploits specifically targeting Apple’s iOS operating system.
These attacks are particularly alarming because they require absolutely no interaction from the device owner. Unlike phishing or malicious links, the compromise occurs silently and without any visible signs to the user. A critical vulnerability, designated as CVE-2025-43200, has been identified as being exploited in this attack vector, allowing attackers to gain unauthorized access to devices.
Such zero-click capabilities are the hallmark of extremely sophisticated adversaries, often linked to state-sponsored groups or elite commercial spyware vendors. The primary targets for these types of attacks are typically high-value individuals, including journalists, human rights defenders, political opponents, and others deemed a threat by powerful entities.
The discovery of Graphite utilizing these techniques underscores the ever-increasing challenge in securing personal mobile devices against nation-state level threats. It highlights the critical need for vigilance and the importance of applying security updates promptly to patch vulnerabilities like CVE-2025-43200 and protect against these stealthy and dangerous intrusions. Understanding these advanced persistent threats (APTs) is crucial for anyone potentially at risk.
Source: https://www.helpnetsecurity.com/2025/06/13/ios-zero-click-attacks-used-to-deliver-graphite-spyware-cve-2025-43200/