Skip navigation

Is there an iphone key logger for non-jail broken phones?

40947 Views 20 Replies Latest reply: Apr 11, 2014 8:24 AM by Pineapple37 RSS Branched to a new discussion.
1 2 Previous Next
Soccerchik08 Level 1 Level 1 (0 points)
Currently Being Moderated
Mar 17, 2012 3:35 PM

I have a non- jail broken iphone 4s and I was just wondering if some one could hack it or put a key logger on it. I also want to know if there is a way I can detect a key logger on my iphone, if there is one. Also how are key loggers put on an iphone? Im just worried because I had one on my Dell and had it removed and want to make sure theres not one on my iphone.

iPhone 4S
  • Meg St._Clair Level 8 Level 8 (37,450 points)

    Soccerchik08 wrote:

     

    I have a non- jail broken iphone 4s and I was just wondering if some one could hack it or put a key logger on it. I also want to know if there is a way I can detect a key logger on my iphone, if there is one.

    No, you can't put a keylogger on an non-jailbroken phone. I suppose, if someone had gotten a hold of your phone for some extended period of time, they could have jailbroken it and installed a keylogger. But I think you'd notice. Is there an app called "Cydia" anywhere on your phone?

     

    Is something happening to make you think such a thing was installed? iOS is remarkably secure.

  • Allan Sampson Level 10 Level 10 (122,145 points)

    Not with a non-hacked iPhone. With a hacked iPhone, all bets are off and someone would need physical access to your iPhone to install it.

  • Julian Wright Level 7 Level 7 (34,835 points)

    No. Key loggers cannot be installed on non-jail broken iPhones.

     

    Legitimate apps do not have the required privileges to log keystrokes apart from within their own app.

  • Allan Sampson Level 10 Level 10 (122,145 points)

    To be sure, I suggest restoring your iPhone with iTunes as a new iPhone or not from the backup. If your ex hacked your iPhone with the cutsie term for this "jailbreak" along with installing a key logger, restoring your iPhone as a new iPhone will remove the hack and anything else that may have been installed on your iPhone.

  • Pyrolite Level 1 Level 1 (0 points)

    Hey! I just had to say that you shouldn't lend out your phone to anybody you don't trust! lol It's like lending out your purse or wallet...

     

    Safety First!

  • MKSIMON Level 1 Level 1 (0 points)

    From some iphone keylogger website, I saw that they require a jailbroken iPhone/iPad for the keylogger to be installed. I'm sure if your iphone is not jailbroken then you won't have a keylogger

     

    <Link Edited By Host> 

  • t.flannery Level 1 Level 1 (0 points)

    Apple uses Unix based operating systems with Java GUIs for their hardware.  It is important for users to understand that the threats for mobile phones of any type are on the rise.  Users store lots of personal information on mobile devises making the devise more valuable than a wallet.  Mobile devises are small computers and are just as vulnerable as a laptop computer if not more because your mobile devise has many interfaces capable of attack. 

     

    The interfaces include service provider WAN (900MHz range), 802.11 WiFi access, Bluetooth, GPS, and infrared.  These interfaces all have different avenues of attack.  Apple takes great care in monitoring their app store but sometimes an attacker can upload malicious code to an app in the store to exploit mobile devices for attack.  This method is popular on droid phones.  Other attacks include Smurf attacks and packet sniffing.  Some people know how to clone your device MAC address to use it in a hotspot that you paid for.  Your devise gets kicked off the hotspot and the attackers devise now has free hotspot service.

     

    Malicious code can make its way on to your phone through URLs, email attachments, infected apps, and other files (photos, audio, and video) just the same as a PC.

     

    Is your locked iPhone vulnerable to a keylogger attack?  I would have to argue, yes it is.

     

    Tom Flannery

    SGT/USAR

    IT Instructor

    BAS IT/NTC - University of Phoenix

  • varjak paw Level 10 Level 10 (167,015 points)

    Apple uses Unix based operating systems with Java GUIs for their hardware. 

     

    Sorry, Sargent Flannery, but that's incorrect and I'm not sure where you got that notion. None of Apple's operating systems use Java in any form for the GUI and have never done so. In fact, iOS won't even run Java at all.

     

    As to keyloggers, a traditional keylogger application would be highly difficult if not impossible in iOS since Apple sandboxes apps from each other, so one app cannot read the keystrokes being entered into another app or the OS. That doesn't mean that apps cannot access information from components for which Apple provides an API such as the Contacts or Calendars, but a traditional keylogger, highly unlikely. Gettting malware onto an iOS device from an email, web site or synched file would also be difficult for the same reasons. Not impossible, but quite difficult.

     

    There are of course other ways someone can capture personal information. But the most common way is to just trick someone into willingly providing it. The number of people who continue to fall for faked emails requesting bank and credit card information just astounds me.

     

    Regards.

    iMac, Mac OS X (10.7.4), Core i7 Radeon 4850 8GB
  • t.flannery Level 1 Level 1 (0 points)

    I stand corrected the iPhone and apps are written in objective-C language which is similar to Java in the fact that it is object oriented and is true that the iPhone will not support java at this time.  Thank you for the correction varjak paw.

     

    Tom Flannery

  • EmmaLS Level 1 Level 1 (5 points)

    Sorry to tell that all cell keylogging apps out there need the phone to be jailbreaken in order to install.

    I know that ikeymonitor is the first keylogger for iPhone. However, you must jailbreak the target phone to install it.

1 2 Previous Next

Actions

More Like This

  • Retrieving data ...

Bookmarked By (0)

Legend

  • This solved my question - 10 points
  • This helped me - 5 points
This site contains user submitted content, comments and opinions and is for informational purposes only. Apple disclaims any and all liability for the acts, omissions and conduct of any third parties in connection with or related to your use of the site. All postings and use of the content on this site are subject to the Apple Support Communities Terms of Use.