Close Menu
Finsider

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    The 10 Most Valuable Vacation Destinations for Retirees in 2026

    October 11, 2025

    If You Can Hack An iPhone, Apple Might Pay You $2 Million

    October 11, 2025

    The fixer’s dilemma: Chris Lehane and OpenAI’s impossible mission

    October 11, 2025
    Facebook X (Twitter) Instagram
    Trending
    • The 10 Most Valuable Vacation Destinations for Retirees in 2026
    • If You Can Hack An iPhone, Apple Might Pay You $2 Million
    • The fixer’s dilemma: Chris Lehane and OpenAI’s impossible mission
    • Trucking company files Chapter 7 bankruptcy, shuts down abruptly
    • Hollywood has no idea what to do about AI
    • Kiplinger Weekly Quiz: What’s Driving the Gold Price?
    • Why Deloitte is betting big on AI despite a $10M refund
    • Sam’s Club Extends A Popular Shopping Perk
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Finsider
    • Markets & Ecomony
    • Tech & Innovation
    • Money & Wealth
    • Business & Startups
    • Visa & Residency
    Finsider
    Home»Tech & Innovation»If You Can Hack An iPhone, Apple Might Pay You $2 Million
    Tech & Innovation

    If You Can Hack An iPhone, Apple Might Pay You $2 Million

    FinsiderBy FinsiderOctober 11, 2025No Comments6 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    If You Can Hack An iPhone, Apple Might Pay You $2 Million
    Share
    Facebook Twitter LinkedIn Pinterest Email






    concept photo of hacker using a smartphone
    Tero Vesalainen/Getty Images

    Compared to most companies, Apple has traditionally been somewhat stingy when it comes to rewarding individuals who unearth iPhone exploits. More recently, though, Apple has come to the realization that if it wants to discover and patch serious iPhone exploits before they get taken advantage of by malicious actors, it has to increase the rewards available to security researchers.

    In light of the above, Apple recently made significant changes to its bug bounty program. On October 10, Apple announced that the top award for an iPhone exploit is now $2 million, compared to $1 million previously. Naturally, to get the $2 million, users will have to discover an exploit that “can achieve similar goals as sophisticated mercenary spyware attacks.” Apple boasts that the $2 million figure is the largest amount offered by any bug bounty program currently in existence. Apple adds that the $2 million payout can jump to $5 million if accompanied by other exploits like bypassing Lockdown Mode.

    Additionally, Apple says that it’s boosting the payouts for other exploits. For example, a method to bypass Gatekeeper is now worth $100,000, while an exploit capable of unauthorized iCloud access now yields $1 million. On top of it all, Apple is expanding the scope of its bug bounty program to include more categories, including WebKit hacks and wireless proximity exploits.

    Apple’s bug bounty program has come a long way


    User holding an iPhone 16 Pro
    Georgeclerk/Getty Images

    Over the past five years, Apple notes that its bug bounty program has yielded more than $35 million in awards to over 800 hackers and researchers. Underscoring Apple’s commitment to make its bug bounty especially appealing is that it is now offering an avenue for researchers to receive awards on an accelerated track.

    “We’re introducing Target Flags, a new way for researchers to objectively demonstrate exploitability for some of our top bounty categories, including remote code execution and Transparency, Consent, and Control (TCC) bypasses,” Apple writes. “Researchers who submit reports with Target Flags will qualify for accelerated awards, which are processed immediately after the research is received and verified, even before a fix becomes available.”

    All of the above is great, and highlights that Apple’s view of bug bounty programs has come a long way. Note that Apple didn’t implement its bug bounty program until 2020, many years after bug bounty programs were established at companies like Google. Before Apple’s bug bounty program began, Apple’s relationship with security researchers was far from ideal. At the time, it wasn’t uncommon to hear security researchers complain that efforts to relay discovered exploits to Apple were often unsuccessful.

    All of that to say this: Apple’s bug bounty program has gone from nonexistent to arguably one of the more comprehensive and lucrative programs in the tech sphere. Apple says its new bug bounty program is set to go live next month.

    Apple’s battle with sophisticated spyware


    Logo of the NSO hacking group
    Poetra.RH/Shutterstock

    One phrase that caught my eye in Apple’s announcement was that its $2 million prize is reserved for exploits similar to “sophisticated mercenary spyware attacks.” This focus highlights Apple’s ongoing efforts to bolster the iPhone against extremely sophisticated spyware campaigns. 

    In recent years, spyware has become incredibly advanced, so much so that it can sometimes infect an iPhone with no user interaction whatsoever. Recall that the NSO Group, for example, has regularly released spyware capable of leveraging zero-day exploits to attack the iPhone. The NSO Group’s Pegasus software is capable of monitoring all aspects of a target’s device, including text messages, emails, photos, and more. The first incarnation of Pegasus was particularly sophisticated because it was able to install itself if a user simply clicked on a link in an SMS message. More recent NSO Group software is capable of infecting a device without any user interaction at all, which is to say a user doesn’t need to click a link or open a file to become vulnerable.

    For years, Apple would routinely patch security vulnerabilities exploited by the NSO Group, only to see the firm release new software capable of skirting around its security barriers. Apple eventually grew so frustrated with the game of cat-and-mouse that it sued the company in 2021 for its “surveillance and targeting of Apple users.”

    “State-sponsored actors like the NSO Group spend millions of dollars on sophisticated surveillance technologies without effective accountability,” Apple’s Craig Federighi said at the time. “Apple devices are the most secure consumer hardware on the market — but private companies developing state-sponsored spyware have become even more dangerous.” Apple ultimately dropped the suit in 2024, noting that the discovery process would reveal sensitive security information.

    iPhone 17’s new tool against powerful spyware


    iPhone 17 homescreen
    Ravi_Sharma1030/Shutterstock

    While we’re on the topic of device security and spyware, it’s worth mentioning that Apple’s iPhone 17 lineup boasts a new security feature designed to better combat spyware. Apple calls the feature Memory Integrity Enforcement (MIE) and claims that it’s the “most significant upgrade to memory safety in the history of consumer operating systems.”

    Put simply, the feature prevents malicious code injection because only trusted code can run in protected memory. Apple writes that most spyware functions by exploiting “memory safety vulnerabilities” and that MIE is specifically designed to prevent that particular attack vector. Apple has been working on MIE since 2020, and it’s currently included in every iPhone 17 model along with the iPhone Air.

    In an Apple research report on MIE, the company said its new security feature is so robust that it may make developing attack vectors against the iPhone 17 prohibitively expensive. Apple specifically boasts that MIE will “disrupt many of the most effective exploitation techniques from the last 25 years, and completely redefine the landscape of memory safety for Apple products.” Together with Apple’s more expansive bug bounty program, it’s clear that Apple is taking concrete steps to ensure that the iPhone remains less susceptible to malware than any other smartphone on the market.



    Apple Hack iPhone Million pay
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleThe fixer’s dilemma: Chris Lehane and OpenAI’s impossible mission
    Next Article The 10 Most Valuable Vacation Destinations for Retirees in 2026
    Finsider
    • Website

    Related Posts

    Tech & Innovation

    Hollywood has no idea what to do about AI

    October 11, 2025
    Tech & Innovation

    Why Deloitte is betting big on AI despite a $10M refund

    October 10, 2025
    Tech & Innovation

    Flipkart’s Super.money quietly partners with troubled Juspay as it expands its reach

    October 10, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Cursor snaps up enterprise startup Koala in challenge to GitHub Copilot

    July 18, 2025

    What is Mistral AI? Everything to know about the OpenAI competitor

    July 18, 2025

    Analyst Report: Kinder Morgan Inc

    July 18, 2025
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Using Gen AI for Early-Stage Market Research

    July 18, 2025

    Cursor snaps up enterprise startup Koala in challenge to GitHub Copilot

    July 18, 2025

    What is Mistral AI? Everything to know about the OpenAI competitor

    July 18, 2025
    news

    The 10 Most Valuable Vacation Destinations for Retirees in 2026

    October 11, 2025

    If You Can Hack An iPhone, Apple Might Pay You $2 Million

    October 11, 2025

    The fixer’s dilemma: Chris Lehane and OpenAI’s impossible mission

    October 11, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    © 2020 - 2025 The Finsider . Powered by LINC GLOBAL Inc.
    • Contact us
    • Guest Post Policy
    • Privacy Policy
    • Terms of Service

    Type above and press Enter to search. Press Esc to cancel.