{"id":200365,"date":"2025-10-21T14:45:08","date_gmt":"2025-10-21T14:45:08","guid":{"rendered":"https:\/\/entertainment.runfyers.com\/index.php\/2025\/10\/21\/exclusive-apple-alerts-exploit-developer-that-his-iphone-was-targeted-with-government-spyware\/"},"modified":"2025-10-21T14:45:08","modified_gmt":"2025-10-21T14:45:08","slug":"exclusive-apple-alerts-exploit-developer-that-his-iphone-was-targeted-with-government-spyware","status":"publish","type":"post","link":"https:\/\/entertainment.runfyers.com\/index.php\/2025\/10\/21\/exclusive-apple-alerts-exploit-developer-that-his-iphone-was-targeted-with-government-spyware\/","title":{"rendered":"Exclusive: Apple alerts exploit developer that his iPhone was targeted with government spyware"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p id=\"speakable-summary\" class=\"wp-block-paragraph\">Earlier this year, a developer was shocked by a message that appeared on his personal phone: \u201cApple detected a targeted mercenary spyware attack against your iPhone.\u201d\u00a0\u00a0<\/p>\n<p class=\"wp-block-paragraph\">\u201cI was panicking,\u201d Jay Gibson, who asked that we don\u2019t use his real name over fears of retaliation, told TechCrunch.\u00a0\u00a0<\/p>\n<p class=\"wp-block-paragraph\">Gibson, who until recently built surveillance technologies for Western government hacking tools maker Trenchant, may be the first documented case of someone who builds exploits and spyware being themselves targeted with spyware.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">\u201cWhat the hell is going on? I really didn\u2019t know what to think of it,\u201d said Gibson, adding that he turned off his phone and put it away on that day, March 5. \u201cI went immediately to buy a new phone. I called my dad. It was a mess. It was a huge mess.\u201d\u00a0\u00a0<\/p>\n<p class=\"wp-block-paragraph\">At Trenchant, Gibson worked on developing iOS <a href=\"https:\/\/techcrunch.com\/2025\/04\/25\/techcrunch-reference-guide-to-security-terminology\/#zero-day\" target=\"_blank\" rel=\"noreferrer noopener\">zero-days<\/a>, meaning finding<strong> <\/strong>vulnerabilities and developing tools capable of exploiting them that are not known to the vendor who makes the affected hardware or software, such as Apple. \u00a0<\/p>\n<p class=\"wp-block-paragraph\">\u201cI have mixed feelings of how pathetic this is, and then extreme fear because once things hit this level, you never know what\u2019s going to happen,\u201d he told TechCrunch.\u00a0\u00a0<\/p>\n<p class=\"wp-block-paragraph\">But the ex-Trenchant employee may not be the only exploit developer targeted with spyware. According to three sources who have direct knowledge of these cases, there have been other spyware and exploit developers in the last few months who have received notifications from Apple alerting them that they were targeted with spyware.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">Apple did not respond to a request for comment from TechCrunch.\u00a0<\/p>\n<div class=\"article-block block--callout block--right has-green-500-background-color\">\n<h4 class=\"block--callout__title\">Contact Us<\/h4>\n<p>\t\t\tDo you have more information about the alleged leak of Trenchant hacking tools? Or about this developer\u2019s story? From a non-work device, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram, Keybase and Wire @lorenzofb, or <a href=\"https:\/\/techcrunch.com\/2025\/10\/21\/apple-alerts-exploit-developer-that-his-iphone-was-targeted-with-government-spyware\/mailto:lorenzo@techcrunch.com\/\" target=\"_blank\" rel=\"noopener\">by email<\/a><a href=\"https:\/\/techcrunch.com\/2025\/10\/21\/apple-alerts-exploit-developer-that-his-iphone-was-targeted-with-government-spyware\/mailto:lorenzo@techcrunch.com\/\" target=\"_blank\" rel=\"noopener\">.<\/a> \t\t<\/div>\n<p class=\"wp-block-paragraph\">The targeting of Gibson\u2019s iPhone shows that the proliferation of zero-days and spyware is starting to ensnare more types of victims.\u00a0\u00a0<\/p>\n<p class=\"wp-block-paragraph\">Spyware and zero-day makers have historically claimed their tools are only deployed by vetted government customers against criminals and terrorists. But for the past decade, researchers at the University of Toronto\u2019s digital rights group <a href=\"https:\/\/techcrunch.com\/2025\/06\/12\/researchers-confirm-two-journalists-were-hacked-with-paragon-spyware\/\" target=\"_blank\" rel=\"noreferrer noopener\">Citizen Lab<\/a>, <a href=\"https:\/\/techcrunch.com\/2025\/03\/28\/again-and-again-nso-groups-customers-keep-getting-their-spyware-operations-caught\/\" target=\"_blank\" rel=\"noreferrer noopener\">Amnesty International<\/a>, and <a href=\"https:\/\/techcrunch.com\/2023\/05\/25\/researchers-say-they-found-spyware-used-in-war-for-the-first-time\/\" target=\"_blank\" rel=\"noreferrer noopener\">other organizations<\/a>, have found <a href=\"https:\/\/github.com\/GranittHQ\/data-pegasus-victims\/blob\/main\/data-pegasus-victims.csv\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">dozens of cases<\/a> where governments used these tools to target <a href=\"https:\/\/techcrunch.com\/2021\/08\/24\/nso-pegasus-bahrain-iphone-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">dissidents<\/a>, <a href=\"https:\/\/techcrunch.com\/2022\/04\/05\/nso-pegasus-jordan-apple\/\" target=\"_blank\" rel=\"noreferrer noopener\">journalists<\/a>, <a href=\"https:\/\/techcrunch.com\/2025\/02\/11\/another-person-targeted-by-paragon-spyware-comes-forward\/\" target=\"_blank\" rel=\"noreferrer noopener\">human rights defenders<\/a>, and <a href=\"https:\/\/techcrunch.com\/2024\/12\/04\/business-leaders-among-pegasus-spyware-victims-says-security-firm\/\" target=\"_blank\" rel=\"noreferrer noopener\">political rivals<\/a> all over the world.\u00a0\u00a0\u00a0<\/p>\n<p class=\"wp-block-paragraph\">The closest public cases of security researchers being targeted by hackers happened in <a href=\"https:\/\/blog.google\/threat-analysis-group\/new-campaign-targeting-security-researchers\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">2021<\/a> and <a href=\"https:\/\/arstechnica.com\/information-technology\/2023\/03\/security-researchers-are-again-in-the-crosshairs-of-north-korean-hackers\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">2023<\/a>, when North Korean government hackers were caught targeting security researchers working in vulnerability research and development.\u00a0<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-suspect-in-leak-investigation-nbsp\"><strong>Suspect in leak investigation<\/strong>\u00a0<\/h2>\n<p class=\"wp-block-paragraph\">Two days after receiving the Apple threat notification, Gibson contacted a forensic expert with extensive experience investigating spyware attacks. After performing an initial analysis of Gibson\u2019s phone, the expert did not find any signs of infection, but still recommended a deeper forensic analysis of the exploit developer\u2019s phone.\u00a0\u00a0<\/p>\n<p class=\"wp-block-paragraph\">A forensic analysis would have entailed sending the expert a complete backup of the device, something Gibson said he was not comfortable with. \u00a0<\/p>\n<p class=\"wp-block-paragraph\">\u201cRecent cases are getting tougher forensically, and some we find nothing on. It may also be that the attack was not actually fully sent after the initial stages, we don\u2019t know,\u201d the expert told TechCrunch.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">Without a full forensic analysis of Gibson\u2019s phone, ideally one where investigators found traces of the spyware and who made it, it\u2019s impossible to know why he was targeted or who targeted him.\u00a0\u00a0<\/p>\n<p class=\"wp-block-paragraph\">But Gibson told TechCrunch that he believes the threat notification he received from Apple is connected to the circumstances of his departure from Trenchant, where he claims that the company designated him as a scapegoat for a damaging leak of internal tools.\u00a0\u00a0<\/p>\n<p class=\"wp-block-paragraph\">Apple <a href=\"https:\/\/techcrunch.com\/2024\/04\/10\/apple-warning-mercenary-spyware-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">sends<\/a> out <a href=\"https:\/\/techcrunch.com\/2025\/04\/30\/apple-notifies-new-victims-of-spyware-attacks-across-the-world\/\" target=\"_blank\" rel=\"noreferrer noopener\">threat<\/a> <a href=\"https:\/\/techcrunch.com\/2025\/07\/22\/apple-alerted-iranians-to-iphone-spyware-attacks-say-researchers\/\" target=\"_blank\" rel=\"noreferrer noopener\">notifications<\/a> specifically for when it has evidence that a person was targeted by a <a href=\"https:\/\/techcrunch.com\/2024\/12\/20\/why-apple-sends-spyware-victims-to-this-nonprofit-security-lab\/\" target=\"_blank\" rel=\"noreferrer noopener\">mercenary spyware attack<\/a>. This kind of surveillance technology is often invisibly and remotely planted on someone\u2019s phone without their knowledge by exploiting vulnerabilities in the phone\u2019s software, exploits that <a href=\"https:\/\/techcrunch.com\/2024\/04\/06\/price-of-zero-day-exploits-rises-as-companies-harden-products-against-hackers\/\" target=\"_blank\" rel=\"noreferrer noopener\">can be worth millions of dollars<\/a> and can take months to develop. Law enforcement and intelligence agencies typically have the legal authority to deploy spyware on targets, not the spyware makers themselves.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">Sara Banda, a spokesperson for Trenchant\u2019s parent company L3Harris, declined to comment for this story when reached by TechCrunch before publication. \u00a0<\/p>\n<p class=\"wp-block-paragraph\">A month before he received Apple\u2019s threat notification, when Gibson was still working at Trenchant, he said he was invited to go to the company\u2019s London office for a team-building event.\u00a0\u00a0<\/p>\n<p class=\"wp-block-paragraph\">When Gibson arrived February 3, he was immediately summoned into a meeting room to speak via video call with Peter Williams, Trenchant\u2019s then-general manager who was known inside the company as \u201cDoogie.\u201d (In 2018, defense contractor L3Harris <a href=\"http:\/\/cyberscoop.com\/l3-acquires-azimuth-and-linchpin\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">acquired<\/a> zero-day makers Azimuth and Linchpin Labs, <a href=\"https:\/\/www.vice.com\/en\/article\/iphone-zero-days-inside-azimuth-security\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">two sister startups<\/a> that merged to become Trenchant.)\u00a0<\/p>\n<p class=\"wp-block-paragraph\">Williams told Gibson the company suspected he was double employed and was thus suspending him. All of Gibson\u2019s work devices would be confiscated and analyzed as part of an internal investigation into the allegations. Williams could not be reached for comment.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">\u201cI was in shock. I didn\u2019t really know how to react because I couldn\u2019t really believe what I was hearing,\u201d said Gibson, who explained that a Trenchant IT employee then went to his apartment to pick up his company-issued equipment.\u00a0\u00a0<\/p>\n<p class=\"wp-block-paragraph\">Around two weeks later, Gibson said Williams called and told him that following the investigation, the company was firing him and offering him a settlement agreement and payment. Gibson said Williams declined to explain what the forensic analysis of his devices had found, and essentially told him he had no choice but to sign the agreement and depart the company.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">Feeling like he had no alternative, Gibson said he went along with the offer and signed.\u00a0\u00a0<\/p>\n<p class=\"wp-block-paragraph\">Gibson told TechCrunch he later heard from former colleagues that Trenchant suspected he had leaked some unknown vulnerabilities in Google\u2019s Chrome browser, tools that Trenchant had developed. Gibson, and three former colleagues of his, however, told TechCrunch he did not have access to Trenchant\u2019s Chrome zero-days, given that he was part of the team exclusively developing iOS zero-days and spyware. Trenchant teams only have strictly compartmentalized access to tools related to the platforms they are working on, the people said.\u00a0\u00a0<\/p>\n<p class=\"wp-block-paragraph\">\u201cI know I was a scapegoat. I wasn\u2019t guilty. It\u2019s very simple,\u201d said Gibson. \u201cI didn\u2019t do absolutely anything other than working my ass off for them.\u201d\u00a0\u00a0<\/p>\n<p class=\"wp-block-paragraph\">The story of the accusations against Gibson\u2019 and his subsequent suspension and firing was independently corroborated by three former Trenchant employees with knowledge. \u00a0<\/p>\n<p class=\"wp-block-paragraph\">Two of the other former Trenchant employees said they knew details of Gibson\u2019s London trip and were aware of suspected leaks of sensitive company tools.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">All of them asked not to be named but believe Trenchant got it wrong.\u00a0<\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/techcrunch.com\/2025\/10\/21\/apple-alerts-exploit-developer-that-his-iphone-was-targeted-with-government-spyware\/\" target=\"_blank\" rel=\"noopener\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Earlier this year, a developer was shocked by a message that appeared on his personal phone: \u201cApple detected a targeted mercenary spyware attack against your iPhone.\u201d\u00a0\u00a0 \u201cI was panicking,\u201d Jay Gibson, who asked that we don\u2019t use his real name over fears of retaliation, told TechCrunch.\u00a0\u00a0 Gibson, who until recently built surveillance technologies for Western [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":200366,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14],"tags":[],"class_list":{"0":"post-200365","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tech"},"_links":{"self":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts\/200365","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/comments?post=200365"}],"version-history":[{"count":0,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts\/200365\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/media\/200366"}],"wp:attachment":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/media?parent=200365"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/categories?post=200365"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/tags?post=200365"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}