

In April, Apple alerted iPhone users across 92 countries about potential spyware attacks linked to their Apple IDs, signaling a growing issue of espionage targeting personal data. This spyware, identified as "LightSpy," originally targeted Hong Kong protesters and has evolved into a more invasive tool capable of extracting extensive personal information and monitoring communications.
The attacks utilize sophisticated "zero-click" methods, where malware is installed via seemingly innocuous messages without any user interaction, making them extremely hard to detect and prevent. This escalation highlights the broader trend of spyware use by state actors and other entities, exemplified by the notorious Pegasus software from NSO Group, which similarly exploits device vulnerabilities to surveil targets globally.