Apple’s iMessage Zero-Click “NICKNAME” Exploit Targets High-Profile Users

iVerify uncovers iMessage zero-click exploit dubbed “NICKNAME” targeting political figures, journalists, and tech execs in US and EU. Update iOS now.
Apples-iMessage-Zero-Click-NICKNAME-Exploit-Targets-High-Profile-Users-1.jpg Apples-iMessage-Zero-Click-NICKNAME-Exploit-Targets-High-Profile-Users-1.jpg

Apple’s iMessage Vulnerability “NICKNAME” Exploited in Targeted Attacks

A new zero-click iMessage exploit, dubbed “NICKNAME,” has been uncovered by security researchers at iVerify, targeting high-profile individuals in the United States and European Union. The sophisticated vulnerability, which affects the iMessage Nickname Update feature, has been exploited in targeted attacks against political figures, journalists, tech executives, and government officials.

According to iVerify’s threat intelligence report, the exploit leverages a race condition in the iMessage Nickname Update feature when “Share Name and Photo” is enabled. Attackers could send nickname information in rapid succession, causing multiple threads to simultaneously access the same dictionaries involved in the update process. This vulnerability affects the “imagent” process, which due to its position in the operating system, provides attackers with a primitive for further exploitation.

iPhone displaying a security alert about a potential zero-click exploit
Source: Pexels Image

The targeted attacks primarily focused on:

  • Political figures and campaign staff
  • Journalists and media organizations
  • Tech company executives (particularly from AI companies)
  • Government officials in the US and EU

iVerify detected extremely rare crashes on affected devices that constituted only 0.0001% of crash log telemetry from a sample of 50,000 iPhones. Evidence suggests the vulnerability was exploited as recently as March 2025, with at least one senior EU government official receiving Apple Threat Notifications after experiencing these crashes.

As zero-click exploits continue to pose a significant threat to mobile security, organizations and high-profile individuals must remain vigilant in protecting their devices and data. Regularly updating software, using mobile threat defense solutions, and following best practices for secure communication can help mitigate the risk of falling victim to targeted attacks like those exploiting the NICKNAME vulnerability.

Add a comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Keep Up to Date with the Most Important News

By pressing the Subscribe button, you confirm that you have read and are agreeing to our Privacy Policy and Terms of Use