DROPOUTJEEP – How NSA completely controls your iPhone

Leaked documents shared by Der Spiegel show how NSA spyware codenamed DROPOUTJEEP can spy on every Apple iPhone. Apple denies any claim.

Users buy the iPhone, NSA controls them. This is not a slogan for the last Apple advertising, it is the uncomfortable truth revealed by another set of NSA documents leaked by Snowden and published by the German magazine Der Spiegel.

The US National Security Agency is able to control every data managed by  iPhone, the documents reveal the existence of spyware codenamed DROPOUTJEEP developed by ANT (Advanced or Access Network Technology) division of the Agency that is used to gain backdoor access to numerous electronic devices, including the popular Apple Smarphones.

Last week Der Spiegel published a couple of posts to describe the work done by the NSA hacking unit known as TAO and the Tools used by the agency to hack practically any technology, from hard drives to network appliances.

Der Spiegel: Inside TAO -Documents Reveal Top NSA Hacking Unit

Der Spiegel: Shopping for Spy Gear – Catalog Advertises NSA Toolbox

The documents describe DROPOUTJEEP as a spyware that can access virtually every component of the iPhone sniffing out data managed, including voice mail, contact lists, instant messages, and cell tower location.

“DROPOUTJEEP is a software implant for the Apple iPhone that utilizes modular mission applications to provide specific SIGINT functionality. This functionality includes the ability to remotely push/pull files from the device. SMS retrieval, contact list retrieval, voicemail, geolocation, hot mic, camera capture, cell tower location, etc. Command, control and data exfiltration can occur over SMS messaging or a GPRS data connection. All communications with the implant will be covert and encrypted.” reports one of NSA documents published by Der Spiegel.

DROPOUTJEEP was presented by cyber security expert Jacob Appelbaum at the 30c3 conference on Monday,  he even speculated on the role played by IT companies like Apple in supporting the NSA surveillance programs providing backdoors access to their products.

A recent report claims that the NSA paid security firm RSA $10 million to adopt as default option a flawed encryption algorithm in one of its popular products.

 

The document states that the DROPOUTJEEP was designed in 2008 to spy on iPhone devices and first variant of spyware requested the installation through “close-access methods.” But 2008 is five years ago, it’s an eternity, and it is easy to imagine that successive versions of DROPOUTJEEP would focus on remote infection methods.

Apple has refused any claims, like RSA,  with an official statement released Tuesday:

“Apple has never worked with the NSA to create a backdoor in any of our products, including iPhone. Additionally, we have been unaware of this alleged NSA program targeting our products. We care deeply about our customers’ privacy and security. Our team is continuously working to make our products even more secure, and we make it easy for customers to keep their software up to date with the latest advancements. Whenever we hear about attempts to undermine Apple’s industry-leading security, we thoroughly investigate and take appropriate steps to protect our customers. We will continue to use our resources to stay ahead of malicious hackers and defend our customers from security attacks, regardless of who’s behind them.”

I believe that this is just the tip of the iceberg, a further reflection is needed, what would happen if these instruments falling into the many cyber mercenaries or foreign governments?
It probably has already happened!

Pierluigi Paganini

(Security Affairs –  DROPOUTJEEP, NSA)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

19 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

21 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

1 day ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

2 days ago

Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release

Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…

2 days ago

Google: state-backed hackers exploit Gemini AI for cyber recon and attacks

Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…

2 days ago

This website uses cookies.