Redazione RHC : 1 August 2025 21:22
An online forum posting dated July 26, 2025, caught our attention: a user named “Bucad” advertised the sale of an iOS RCE Exploit 0day | ZeroClick/1Click. The exploit, apparently capable of completely compromising an iOS 18.5 device, including rooting, without any visible crashes or significant user interaction, and with persistence capabilities, represents a potential threat of significant proportions.
While the veracity of such claims remains unclear in contexts like these, the announcement raises crucial questions about the functioning and implications of the zero-day exploit and spyware market that we want to reiterate.
A 0-day RCE (Remote Code Execution) Exploit is a critical software vulnerability that allows an attacker to execute arbitrary code on a remote system (RCE) without the software vendor (in this case, Apple) knowing about it or having had time to release a patch (0-day).
CALL FOR SPONSOR - Sponsorizza l'ottavo episodio della serie Betti-RHCSei un'azienda innovativa, che crede nella diffusione di concetti attraverso metodi "non convenzionali"? Conosci il nostro corso sul cybersecurity awareness a fumetti? Red Hot Cyber sta ricercando un nuovo sponsor per una nuova puntata del fumetto Betti-RHC mentre il team è impegnato a realizzare 3 nuovi episodi che ci sono stati commissionati. Contattaci tramite WhatsApp al numero 375 593 1011 per richiedere ulteriori informazioni oppure alla casella di posta [email protected] ![]()
Se ti piacciono le novità e gli articoli riportati su di Red Hot Cyber, iscriviti immediatamente alla newsletter settimanale per non perdere nessun articolo. La newsletter generalmente viene inviata ai nostri lettori ad inizio settimana, indicativamente di lunedì. |
The key characteristics of a 0-day RCE, such as those described in the announcement, make it extremely dangerous:
In this specific case, an exploit of this level on an operating system like iOS would be extremely valuable. If the claims are true, a similar bug, affecting the latest version of iOS (18.5) and supporting future updates, could be worth millions of euros on the black market, reflecting its rarity and enormous exploitation potential.
A zero-day RCE exploit, especially for popular platforms like iOS, can be used for a variety of purposes, most of which are illicit or ethically questionable:
There is a market, largely underground and highly specialized, where zero-day exploits are bought and resold, including at private auctions. Major players include:
The zero-day market is closely linked to the commercial spyware industry, which often uses these exploits to operate. Companies such as NSO Group (with its infamous Pegasus spyware), Candiru, Paragon, Gamma Group (with FinFisher), and others develop sophisticated surveillance software that can intercept calls, read messages, access the microphone and camera, track location, and steal data from a target device.
This spyware is sold to governments and law enforcement agencies under the justification of fighting terrorism, organized crime, and pedophilia. However, its use has become the subject of heated debate and bitter controversy for several reasons:
The international community is divided on how to address this market. Some advocate for a complete ban on the sale of spyware to non-state entities and for more stringent global regulation. Others emphasize the need for such tools for national security and the fight against real threats, while acknowledging the problem of abuse.
In conclusion, the announcement of a zero-day exploit for iOS, while its authenticity remains to be verified, reminds us of the ongoing threat posed by software vulnerabilities and the existence of a highly sophisticated underground market. This ecosystem, fueled by brokers and spyware companies, poses global ethical and security challenges that require ever-increasing attention and regulation to protect individuals’ rights and privacy in the digital age.