Watch This Man Hack 26 iPhones At The Same Time Without Even Touching Them
Dhir Acharya
Ian Beer, a professional Google security researcher, found bugs allowing him to hack into iPhones close by using some cheap gear and the Rasberry Pi.
- This Viral TikTok Video Teaches iPhone Users A Hidden Trick That Many Didn't Know
- This Viral TikTok Video Details How To Unlock iPhone With Mask On
- How To View Messages When Your Phone Screen Is Broken
The COVID-19 pandemic and large-scaled lockdowns as a result of it have given people a lot of extra free time to spend on the hobbies they were too busy to enjoy. While some chose to watch Netflix, others took the chance to create stuff.
During this time, Ian Beer, a professional Google security researcher, found bugs allowing him to hack into iPhones close by just by using some cheap gear and the Rasberry Pi. He shared the exploit in his blog post that includes how he carried out the trick. It took him half a year to make this trick work.
A hack like this is scary to a lot of us because we don’t know how much harm they can cause. As explained by the security researcher, he created a wormable radio-proximity exploit that let him take over any iPhone nearby. He could view all emails, photos, as well as copy personal messages while monitoring everything happening on the phone in real-time.
All he had to do was pointing his own homemade antenna at the phones whose information he had. The technique sent an exploit through WiFi, requiring no user interaction. It’s so scary that nowadays hacks don’t even involve any manual links or interactions like before.
Provided that the phone is in someone’s vicinity with such a contraption, its control could be obtained without even touch or action. Furthermore, the exploit was wormable, meaning the radio-proximity exploit can spread from one phone to another with no user interaction, according to reputable cybersecurity reporter Dan Goodin.
Beer posted a short video on YouTube displaying the prowess of his system when it hijacks 26 iPhones at the same time with a single broadcast. It’s both impressive and intimidating to watch that many phones die at varying rates with your own eyes.
In a longer video, he showed how the broadcast functions as well as how it could spread from phone to phone that wasn’t the initial target.
Beer also included cautions in this post, saying:
“Imagine the sense of power an attacker with such a capability must feel. As we all pour more and more of our souls into these devices, an attacker can gain a treasure trove of information on an unsuspecting target.”
>>> We Spend Nearly 9 Years Of Our Lives On The Phone, Study Finds
Featured Stories
Review - Apr 05, 2025
Nintendo Switch 2 vs PlayStation 4, Which Is More Powerful?
Review - Apr 03, 2025
Top 5 Budget Cameras For Beginners (2025)
Features - Feb 26, 2025
Elon Musk Eyes Indian Market: Tesla’s Next Big Move?
Features - Aug 03, 2023
The Impact of Social Media on Online Sports Betting
Features - Jul 10, 2023
5 Most Richest Esports Players of All Time
Features - Jun 07, 2023
Is it safe to use a debit card for online gambling?
Features - May 20, 2023
Everything You Need to Know About the Wisconsin Car Bill of Sale
Features - Apr 27, 2023
How to Take Advantage of Guarantee Cashback in Online Bets
Features - Mar 08, 2023
White Label Solutions for Forex
Review - Jul 15, 2022
WHY BETTING SIGNUP OFFERS ARE IMPORTANT FOR NEW GAMBLERS
Read More
Review- Apr 05, 2025
Nintendo Switch 2 vs PlayStation 4, Which Is More Powerful?
For gamers valuing flexibility and Nintendo’s signature polish, the Switch 2 is the superior choice, even at launch.
Review- Apr 07, 2025
Top 4 Budget Gaming Laptops to Check Out in 2025
It is a bit more expensive to get a good enough gaming laptop comparing to PC options - here are the 4 best choices in 2025.