Are files scanned for malware during uploads?

malware scans at copy/upload operation?

iPad Air, iPadOS 26

Posted on Jan 25, 2026 1:43 PM

Reply
Question marked as Top-ranking reply

Posted on Jan 26, 2026 11:43 AM

NventiveGuy wrote:
I wonder if that code was in a machine-language that an Intel chip
in an iOS device could execute.

The cpu on an iOS devices is not an Intel chip. Code built for an Intel chip will not run, and code built for the Apple Silicon chip on the iOS device must be signed to execute.

You say that iOS doesn’t allow such code-execution?

Correct, executable code must be signed by Apple.

I also was told that files like .doc and .docs may also contain code.

The code you are referring to on .doc and .docx files are Virtual Basic scripts and they don't run on iOS. Even a Word document with a legitimate script is not compatible with iOS and will not work if opened in Word for iOS. Some may consider that a disadvantage in iOS since a Word document containing scripts created on a Windows platform will not display correctly on iOS, but that is the way it is. Apple took the same criticism when they launched the iPhone and it would not run Flash documents on the device and that continues to this day.

I assume that most malicious written for other op-systems can NOT run on iOS.

Correct. Not even legitimate code written for another OS can run.

Also I encountered TIFF files that had malware (in Windows)

Probably true. Other platforms can use third party libraries that may be exploited when used to open the picture file that results in a Buffer Overflow error to break out and execute code. It is actually those libraries that are targeted due to a flaw that allows the code to be executed. With iOS, there is a single Framework created by Apple that is responsible for opening Image files (TIFF, JPG, PNG, etc) called Image I/O.

I come from a Windows background where I used to scan files for Malware by doing a right-click on a filename and requesting a scan. Is there nothing in iOS/iPad OS that can do this?

There is not and for good reason. The whole malware scan process is based on identifiable code signatures to detect Malware and that flawed approach means you are always playing a cat-mouse game to update those signatures to prevent Malware. You will never be able to prevent the next Malware exploit using this approach. The solution is to never allow Malware to execute in the first place. You could certainly place a file with a known Windows Malware/Virus in the Files app, but there is nothing that will allow it to execute or interfere with any operations. Just like you could place an .exe file from Windows in the Files app on iOS, and there is nothing that would allow that to execute either.


The paradigm is a completely different approach. If you are looking for a way to prevent flat tires from nails in the road, you don't need to "scan" the road for nails, you create a solid rubber tire where the nails have no effect on your car. Others may certainly miss a nail that will result in a flat, but it has no effect on you. You may even wonder why are they having to "scan" the road for nails?

Is there an Apple doc that describes this in detail?

There are many documents that describe the Security protections used by iOS/iPad OS.

Apple Platform Security - Apple Support


Some key takeaways specific for iOS/iPad OS.

  • The OS is on a Sealed, Read Only partition of the drive where no modifications are possible.
  • Apple signs the OS to further protect modifications and uses Secure Boot so it is not possible to even boot from a different partition of the drive.
  • Executable code has to be signed by Apple.
  • No Remote Login Services are even included. Instead of trying to determine if a remote access client is legitimate, you don't allow them at all. From the above link: "Unnecessary tools, such as remote login services, aren’t included in the system software, and APIs don’t allow apps to escalate their own privileges to modify other apps or iOS, iPadOS, and visionOS."
  • Breakout code using memory locations cannot even execute as also seen in the above link: "Further protection is provided by iOS and iPadOS using ARM’s Execute Never (XN) feature, which marks memory pages as nonexecutable."
  • Memory locations are randomized using ASLR (Address Space Layout Randomization) where in other platforms you would know where in memory a framework/application will load and be able to modify the memory instead of modifying the actual file. That is not possible on iOS where you not only don't know where it is loaded, you cannot specific a memory location to store any code.
  • The advantage of iOS is that Apple owns the Hardware, Software, and Services creating the closed system often referred to as a Walled Garden. While usually this Walled Garden is viewed negatively by others because users are not free to do what they want and there are some compatibility issues, such as the inability to run those Scripts and Flash programs described previously, it is what makes it possible to put those Security protections in place.
17 replies
Question marked as Top-ranking reply

Jan 26, 2026 11:43 AM in response to NventiveGuy

NventiveGuy wrote:
I wonder if that code was in a machine-language that an Intel chip
in an iOS device could execute.

The cpu on an iOS devices is not an Intel chip. Code built for an Intel chip will not run, and code built for the Apple Silicon chip on the iOS device must be signed to execute.

You say that iOS doesn’t allow such code-execution?

Correct, executable code must be signed by Apple.

I also was told that files like .doc and .docs may also contain code.

The code you are referring to on .doc and .docx files are Virtual Basic scripts and they don't run on iOS. Even a Word document with a legitimate script is not compatible with iOS and will not work if opened in Word for iOS. Some may consider that a disadvantage in iOS since a Word document containing scripts created on a Windows platform will not display correctly on iOS, but that is the way it is. Apple took the same criticism when they launched the iPhone and it would not run Flash documents on the device and that continues to this day.

I assume that most malicious written for other op-systems can NOT run on iOS.

Correct. Not even legitimate code written for another OS can run.

Also I encountered TIFF files that had malware (in Windows)

Probably true. Other platforms can use third party libraries that may be exploited when used to open the picture file that results in a Buffer Overflow error to break out and execute code. It is actually those libraries that are targeted due to a flaw that allows the code to be executed. With iOS, there is a single Framework created by Apple that is responsible for opening Image files (TIFF, JPG, PNG, etc) called Image I/O.

I come from a Windows background where I used to scan files for Malware by doing a right-click on a filename and requesting a scan. Is there nothing in iOS/iPad OS that can do this?

There is not and for good reason. The whole malware scan process is based on identifiable code signatures to detect Malware and that flawed approach means you are always playing a cat-mouse game to update those signatures to prevent Malware. You will never be able to prevent the next Malware exploit using this approach. The solution is to never allow Malware to execute in the first place. You could certainly place a file with a known Windows Malware/Virus in the Files app, but there is nothing that will allow it to execute or interfere with any operations. Just like you could place an .exe file from Windows in the Files app on iOS, and there is nothing that would allow that to execute either.


The paradigm is a completely different approach. If you are looking for a way to prevent flat tires from nails in the road, you don't need to "scan" the road for nails, you create a solid rubber tire where the nails have no effect on your car. Others may certainly miss a nail that will result in a flat, but it has no effect on you. You may even wonder why are they having to "scan" the road for nails?

Is there an Apple doc that describes this in detail?

There are many documents that describe the Security protections used by iOS/iPad OS.

Apple Platform Security - Apple Support


Some key takeaways specific for iOS/iPad OS.

  • The OS is on a Sealed, Read Only partition of the drive where no modifications are possible.
  • Apple signs the OS to further protect modifications and uses Secure Boot so it is not possible to even boot from a different partition of the drive.
  • Executable code has to be signed by Apple.
  • No Remote Login Services are even included. Instead of trying to determine if a remote access client is legitimate, you don't allow them at all. From the above link: "Unnecessary tools, such as remote login services, aren’t included in the system software, and APIs don’t allow apps to escalate their own privileges to modify other apps or iOS, iPadOS, and visionOS."
  • Breakout code using memory locations cannot even execute as also seen in the above link: "Further protection is provided by iOS and iPadOS using ARM’s Execute Never (XN) feature, which marks memory pages as nonexecutable."
  • Memory locations are randomized using ASLR (Address Space Layout Randomization) where in other platforms you would know where in memory a framework/application will load and be able to modify the memory instead of modifying the actual file. That is not possible on iOS where you not only don't know where it is loaded, you cannot specific a memory location to store any code.
  • The advantage of iOS is that Apple owns the Hardware, Software, and Services creating the closed system often referred to as a Walled Garden. While usually this Walled Garden is viewed negatively by others because users are not free to do what they want and there are some compatibility issues, such as the inability to run those Scripts and Flash programs described previously, it is what makes it possible to put those Security protections in place.

Jan 25, 2026 3:48 PM in response to NventiveGuy

There are no true Antivirus Products available for iOS/iPadOS. Those that claim to provide AV protection are little more than “snake oil” - and should generally be avoided. Due to architectural sandboxing, so-called AV for iPadOS cannot escape its own sandbox - and is therefore unable scan the iPad's filesystem for malware code. Security products for iOS/iPadOS typically rely upon an external network proxy (often implemented via a VPN connection).


Due to the system architecture of iOS/iPadOS, unless jailbroken, your iPad is not susceptible to traditional malware infection per-se. However, as with all computer systems, there are still vulnerabilities and exploits to which you remain vulnerable. While your iPad is unlikely to be directly infected by malware, it is still possible to easily download an “infected” file to the iPad - which if transferred elsewhere has the capacity to infect other computer systems with malware.





Jan 30, 2026 6:34 AM in response to NventiveGuy

NventiveGuy wrote:
When I made my 2nd & 3rd posts here on Jan 26, I wasn’t shown
some great replies made the day before. I did see 2 replies, from Nial,
but not from others. Did I just need to refresh my browser tab?

If you had left the tab open, then yes you would need to refresh the page, it will not update automatically. It may also be the case that your Sort Order was set to Rank where the posts are displayed out of order in an attempt to show the most relevant replies on top. I would suggest to check the Sort Order of this thread that shows under your original post just below the Top Ranking Reply. Under Sort By, I use Newest, so the most recent post appears on top of the page in reverse chronological order.

1- I need to run a malware-scanner/remover on the source file system?
I would think I’d need to do that before uploading into iOS.

Correct. Not because the iOS device will be affected by the malware, but because you may choose to transfer that file containing malware to another platform that is susceptible to malware. If the iOS device is the endpoint of the file, there is no need.

2– Does iOS or its apps strip out unsigned/disallowed code from these files?

No. A file containing Malware can be transferred to the Files app and you can then move it to another platform where the Malware will remain. It just will have no effect on iOS.

Also because I don't buy new devices, the ones I buy may have been jailbroken. Is there a way to determine that?

A Factory Reset will reset the device if it had been jailbroken. I prefer doing that when plugged into a computer so the OS is also wiped and replaced. There are other concerns when buying a used device that a Factory Reset will not resolve:

  • A Managed Device set up for a Work or School environment can only be removed by the company that set up the management on the device.
  • A device that is Locked to the Owner because it had not been properly reset (or maybe stolen) will be unusable to you and only the original owner can remove the lock.
  • A device can have a Carrier Lock tied to a specific cell provider and only that cell provider can remove the lock. Most would not do that if you are not their customer and Apple cannot remove a Carrier Lock on a phone either.
I do use Flash Drives that were no formatted first with iOS. I assume they're FAT 32. I have 1000s of ties on such drives. Should I use an AV app on the source file system to scan them? (before using in iOS)

I see no need to do that from a security standpoint. If you choose to reuse those drives, they should be reformatted instead of just removing all the files. That is simply because they get easily corrupted, not due to a virus, but usually because they were not properly ejected from the file system before removal. They can be used as an additional backup method, but should not be the only backup method due to their volatility.

Jan 26, 2026 12:06 PM in response to Mac Jim ID

Mac Jim ID wrote:

NventiveGuy wrote:

Also I encountered TIFF files that had malware (in Windows)

Probably true. Other platforms can use third party libraries that may be exploited when used to open the picture file that results in a Buffer Overflow error to break out and execute code. It is actually those libraries that are targeted due to a flaw that allows the code to be executed. With iOS, there is a single Framework created by Apple that is responsible for opening Image files (TIFF, JPG, PNG, etc) called Image I/O.


Probably a reference to the libTIFF vulnerability from a decade or so ago.


There was an exceedingly clever exploit against iPhone and iPad via a now-fixed flaw in JBIG2 image processing:


https://projectzero.google/2021/12/a-deep-dive-into-nso-zero-click.html


This "weird machine" exploit is among the cleverest exploits I've ever seen reported, too.


Steps were taken here too, including with blastdoor and lockdown.


But looking at this whole discussion more generally, the Windows environment and security model is wildly different than that of iOS and iPadOS. Applying Windows knowledge and assumptions can be problematic.


But should anybody here be targeted by mercenary software, you're going to either have your sensitive information already isolated and segmented, or you're probably going to have a bad day.


About Apple threat notifications and protecting against mercenary spyware - Apple Support


There's more security-reading related available via Citizen Lab, too.


https://citizenlab.ca/research/first-forensic-confirmation-of-paragons-ios-mercenary-spyware-finds-journalists-targeted/


And some related info: Better Securing Your Data, and Apple Acco… - Apple Community


Alas, there's no certainty with security, other than that a completely secure device is also an unusable device.

Jan 30, 2026 7:46 AM in response to NventiveGuy

Go load whatever unnecessary and variously privacy-problematic app, if it’ll make you feel better.


It’ll have negligible or no benefits, and these apps tend to be noisy and for no reason other than self-advertising. Adding one, two, or more apps won’t appreciably help things. Those add-on apps might pillage your privacy sure, but that’s seemingly the purpose of too many of the anti-malware apps these days. Though some of what gets sold can make your network wobble.


Put a favorite sticker on your iPad, as it’ll have the same beneficial effects as the add-ons, and likely with fewer adverse effects. 😉


Why? You’re not a target of the expensive malware. Or if you are, you need better and personalized advice than us.


What I’d focus on here? Backups. Better Apple Account security. Two-factor authentication on important accounts. Passkeys where available. Clearing out the list of Apple-generated security recommendations. Did I mention backups? Stuff gets dropped, dunked, lost, stolen, phished or scammed or spear-phished, files accidentally deleted, Apple Accounts lost, and the little people that borrow unlocked devices for games cause all sorts of mayhem, too. This stuff: Better Securing Your Data, and Apple Acco… - Apple Community


Feb 6, 2026 1:33 AM in response to NventiveGuy

I couldn’t post the rest of my response a few minutes ago. Trying again now.


I don’t think you understood a couple important details. 

Please let me explain. 


In my question, I used the phrase “an AV app on the source file system”. 

I meant to indicate “when the source/origin of the file was not iOS, but 

was Win/Andr/Lin/ChrOS”. 

In other words, when using a file originated on non-iOS system

it seems the only way to rid that file of malware

is to use an AV app on the system where it originated

And I’d say do that before uploading into the iOS ecosystem. 

(Of course I’m talking about non-iOS malware. You know that, right?)


I have most of my pre-2020 files backed up to both OneDrive and iCloud! 

I checked some today, and one subset of them (~8,000 pics, from yr 1900 to 1978) 

seem clean. I hope my “quick assessment” is correct! 


Once I verify which of the other 17,000 on OneDrive are also on iCloud, 

I can totally erase these redundant OneDrive copies! Oh, happy day! 

Unfortunately, I doubt those file sets match perfectly. 99.999% unlikely, as I was 

also working a bit on Windows until a 2018 hack destroyed my Surface Pro. 

After that, I tossed Windows to the curb. I had backed up my OneDrive to 

my iCloud in 2017, if my memory serves me correctly. I think I also backed up 

my iCloud-unique files to OneDrive, but can’t be sure without a check. 


I used Android and ChromeOS for about a year, because 

Android offered a 7” phone, and a Samsung/ChrOS tablet was thin & light, 

and had an S-pen and really nice keyboard. 

Both were beautiful pieces of hardware. I’m a hardware geek!  


I have some of those files saved on OneDrive (only, I’d guess), 

and some on a couple flash drives. Flash-drive files may only be gdoc files 

and some S-pen Notes. Relatively unimportant, but I’ll still look at them. 

(I don’t want to lose my research into using an external monitor using Display Port. 

Most iOS devices can display using DP-Alt Mode (hardware-wise), 

but I’ve not been able to confirm one can use touch on that ext monitor 

and have it feed back to the “broadcasting” device.) 


I have not uploaded these Andr & ChrOS files to iOS, because:


  *I didn’t know how iOS would react to Andr & ChrOS malware. 

   (Now I believe it doesn’t, and I understand why.) 


  *I haven’t run any AV check of them on Win/Andr/Lin/ChrOS. 

    I think I will do that soon, starting with Win+AV at a library. 


Those two flash drives I used ~2020-22 are the only place 

I stored Android & ChromeOS files I created. 

I didn’t want to keep my login to Samsung’s cloud. 

There may be a similar reason re: the ChromeOS files. 


Some of those are likely in my G Drive. I suppose I will be able 

to differentiate between files I created using Google apps on iOS 

vs ones I created on Android or ChromeOS. I’ll cross that bridge later. 

Or maybe scan every freaking file with Andr, Win, ChrOS, Linux. 

Yes, it seems I should read each file with a device that’s running the 

“file-originating” OS — and has a good AV app. Tedious, but seems necesary! 


I doubt I could recall which OS I used to create each OneDrive file —  

that are not also backed up on iOS!!! Even then I should scan all iCloud files 

with these systems, right? Who knows where a file originated?! 


Oh, and I also have perhaps 1,000 files (mostly pics) on G Drive. 

Those I created on iOS with G Drive app, so I’m not as concerned about them. 


Again, I share this because I think many are in my boat — now use only iOS devices, 

but have files that they originated on other OSs. Or might accept non-iOS files from 

others (not likely a problem) and then forward them on to different people (could be 

a big problem, because they may know iOS as super-safe, but don’t know that 

it passes on existing malware from non-iOS files). 


I will draw a big diagram of all these situations, and determine 

what to do in each. I’m still using most of my energies on my Grandsons, 

one of whom has autism and some ADD. That diagram might be in March, 

but I want to get these issues resolved and uncluttered my head sooner! 


Cheers! .  



Jan 25, 2026 2:53 PM in response to NventiveGuy

Two thoughts come to mind.

  1. Lockdown Mode? From the following article: “Lockdown Mode is an optional, extreme protection that’s designed for the very few individuals who, because of who they are or what they do, might be personally targeted by some of the most sophisticated digital threats. Most people are never targeted by attacks of this nature.” Is that you? About Lockdown Mode - Apple Support
  2. File or device issue? You seem to encounter problems when copying to devices - generally pre-used devices. Are these devices properly initialized, cleansed and formatted before you use them? From the iPad User Guide: “Note: An external storage device must have only a single data partition, and it must be formatted as APFS, APFS (encrypted), macOS Extended (HFS+), exFAT (FAT64), FAT32, or FAT. To change the formatting of a storage device, use the Files app on iPad or a Mac or PC.”

Jan 25, 2026 2:45 PM in response to NventiveGuy

I should add some details to this general question.


Last month, I was going to use a house-mate’s printer.

She said the best way was to copy a file onto a flash drive

and then have the printer read the file on the drive.

I used a flash drive that I’d used a couple years ago

to store Android files, using a Samsung S7FE tablet, I now believe.


I got a few different errors when trying to copy my file to the flash.


Here’s another message:


I was trying to create a PNG or JPG version of the iOS file while Sharing it

to the flash, if I recall correctly. Got another error message similar to the 1st,

which I can also upload if that would help.


I called AplCare, and the rep seemed knowledgeable. He said these messages

are ones that iOS would display. I didn’t get a definitive answer to my question

about whether/not files would be malware-scanned when uploaded

(like from a flash drive I have here, modified by Android).


So I used a new, out-of-the-box flash drive, and copied a PNG file to it.

I didn’t receive any errors, and the file printed just fine.


I created the file on an iPad 9th, on which I have LockDown mode enabled.

As I stated in previous postings, I’m working on a device set that’s

about as secure as I can make it. Unfortunately that new iPad isn’t tied to

a new, anonymous phone number. I wasn’t willing to wait while I researched

how to set up a new phone that is paid anonymously.

I wanted to try LockDown sooner than after a week of more research.

If I feel a need to get more secure later, I will do that.


I want to copy a boatload of files I have stored in Google Drive, which

I have installed on another phone (used to have my current number on it).

I don’t know iOS well enough to do that now. I’m open to being convinced.


Can someone send me some official Apple doc(s) that say indeed all files

copied into iCloud are scanned for malware. I might copy my files onto

this flash drive (the one where the file Copy worked, not the one where

the errors were reported). Would that be a safer intermediate step?

Which could also have iOS scan the files twice—one time during the copy to

the flash, and a second time when copied from the flash into iCloud.

At least that’s my assumption — which may not be correct.


Thank you in advance.

Jan 25, 2026 2:38 PM in response to Niel

I don’t have a Mac or PC.

I quit using Windows years ago when a hacker destroyed a Surface Pro 4

that I was using at a public library. (I did a hard Reset, and it never turned on again.)


I tried a Macbook 10 years ago, and didn’t like the UI.

I believe that someone in this Forum said that MacOS is not as secure

as iOS/iPadOS. Is that true?


Thanks!

Jan 25, 2026 4:49 PM in response to Niel

To Niel:

I interpret “less restrictive” to conversely mean “more allowed”.

And I assume by “It’s” that you’re talking about

((Copy/Share operations that read files from other devices)).

I have a yuuge desire to understand these situations exactly,

because my security is at stake here.


You said “requires the operator’s permission”, which I infer you mean

that I am the one making the call as to whether a file is safe to load

into my device or iCloud account.


Is there an Apple doc that describes this in detail?


I might be misguided, but I believe it is iOS’s responsibility

to scan a file before storing it in its ecosystem.

Stated conversely, it seems irresponsible that iOS would

NOT malware-scan files before allowing them into its ecosystem.


I come from a Windows background where I used to scan files for malware

by doing a right-click on the filename and requesting a scan.

Is there nothing in iOS/iPadOS that can do this?

or that automatically does it? (which I fully expect)


I ask these questions for myself as well as for 99% of iOS users

who at some point will want to use files that were

generated outside our safe, integrated ecosystem.


Thanks to all who might contribute info!

Jan 25, 2026 4:56 PM in response to NventiveGuy

Also I encountered TIFF files that had malware (in Windows).

I wonder if that code was in a machine-language that an Intel chip

in an iOS device could execute. You may be saying that

iOS doesn’t allow such code-execution? Please be clear for my simple mind.

(Yes I used to write programming manuals for a big corporation, but

I don’t want to read hundreds of pages to get up to speed on iOS security.)


I also was told that word-processor files (like .doc and .docx) may also

contain code. Something about scripts being part of the specification

of what is allowed in those files.


I assume that most malicious code written for other op-systems

can NOT run on iOS. That gives me great comfort, but not total confidence.


Again, I think this applies to many, not just me.

Thanks for your patience!

Jan 25, 2026 5:44 PM in response to NventiveGuy

Reformat the FAT volume, as those can get corrupted all by themselves.


Check whether the printer supports AirPrint and bypass the “fun“ entirely. You can post the vendor and model here. Or can check whether it is accessible when connected to the local Wi-Fi, as AirPrint may well already be enabled by default.


Add-on security apps including VPN apps can introduce as many or more issues as they might avoid.

Jan 26, 2026 1:01 PM in response to MrHoffman

MrHoffman wrote:

I also agree with your analysis. Certainly mercenary spyware costing close to a $1 million per exploit affecting high profile individuals or those carrying Government secrets is a concern for a few individuals. Also the intentional act of Jailbreaking a device that results in bypassing security measures is not recommended, although there are ways a user may be able to do that.


Since the OP was viewing Malware from a Windows perspective, I wanted to highlight the difference in those platforms and what protections are in place specifically on iOS where the whole concept of viruses that spread in the OS and the need to "scan" for Malware is non existent.

Are files scanned for malware during uploads?

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.