Cybersecurity2 hrs ago

Apple patches iOS bug that allowed FBI to retrieve deleted Signal messages

Apple released iOS 17.5.1 to fix a logging bug that let law enforcement recover deleted Signal messages from the push notification database. Users should update immediately.

Peter Olaleru/3 min/US

Cybersecurity Editor

TweetLinkedIn
Apple patches iOS bug that allowed FBI to retrieve deleted Signal messages
Credit: UnsplashOriginal source

Apple patched an iOS logging bug that let the FBI recover deleted Signal messages from the push notification database. The fix is included in iOS 17.5.1 and requires only a device update.

Context

Signal messages are designed to disappear after being read, but iOS was retaining copies of notification text in a logging database. This allowed forensic tools to extract message content even after the app was deleted or the message expired. The issue came to light when the FBI testified it could retrieve such data from a suspect's iPhone.

Key Facts

- 404 Media reported the vulnerability after a hearing where the FBI described extracting Signal messages from a deleted app. - Apple confirmed the bug stemmed from a logging issue that failed to redact notification data marked for deletion. - Apple released a fix in iOS 17.5.1, stating notifications should never have been stored. - Signal thanked Apple for the rapid response and stressed that ecosystem cooperation protects private communication. - No user action is needed beyond updating the device.

What It Means

The fix closes a specific data‑retention path that law enforcement could exploit for forensic recovery of disappearing messages. For most users, updating to iOS 17.5.1 eliminates the risk without changing Signal settings. Organizations should verify that devices run the patched version and consider disabling notification previews for sensitive apps as an additional layer. Defenders can monitor for unusual access to the push notification database via endpoint detection tools that flag reads of com.apple.ncserviced logs.

Mitigations / What Defenders Should Do - Deploy iOS 17.5.1 or later across all managed devices (Apple Security Update 2024-001). - Enforce a configuration that hides message content in push notifications (Settings → Notifications → Show Previews → When Unlocked or Never). - Audit logs for attempts to read the push notification database (MITRE ATT&CK T1003.008 – OS Credential Dumping: /var/mobile/Library/Preferences/com.apple.ncserviced.plist). - Stay alert for future disclosures about data retention in system services and apply patches promptly.

Watch for similar logging flaws in other system components as Apple continues to harden iOS privacy boundaries.

TweetLinkedIn

More in this thread

Reader notes

Loading comments...