Apple patches iOS bug that allowed FBI to retrieve deleted Signal messages
Apple released iOS 17.5.1 to fix a logging bug that let law enforcement recover deleted Signal messages from the push notification database. Users should update immediately.
TL;DR
Apple patched an iOS logging bug that let the FBI recover deleted Signal messages from the push notification database. The fix is included in iOS 17.5.1 and requires only a device update.
Context
Signal messages are designed to disappear after being read, but iOS was retaining copies of notification text in a logging database. This allowed forensic tools to extract message content even after the app was deleted or the message expired. The issue came to light when the FBI testified it could retrieve such data from a suspect's iPhone.
Key Facts
- 404 Media reported the vulnerability after a hearing where the FBI described extracting Signal messages from a deleted app. - Apple confirmed the bug stemmed from a logging issue that failed to redact notification data marked for deletion. - Apple released a fix in iOS 17.5.1, stating notifications should never have been stored. - Signal thanked Apple for the rapid response and stressed that ecosystem cooperation protects private communication. - No user action is needed beyond updating the device.
What It Means
The fix closes a specific data‑retention path that law enforcement could exploit for forensic recovery of disappearing messages. For most users, updating to iOS 17.5.1 eliminates the risk without changing Signal settings. Organizations should verify that devices run the patched version and consider disabling notification previews for sensitive apps as an additional layer. Defenders can monitor for unusual access to the push notification database via endpoint detection tools that flag reads of com.apple.ncserviced logs.
Mitigations / What Defenders Should Do - Deploy iOS 17.5.1 or later across all managed devices (Apple Security Update 2024-001). - Enforce a configuration that hides message content in push notifications (Settings → Notifications → Show Previews → When Unlocked or Never). - Audit logs for attempts to read the push notification database (MITRE ATT&CK T1003.008 – OS Credential Dumping: /var/mobile/Library/Preferences/com.apple.ncserviced.plist). - Stay alert for future disclosures about data retention in system services and apply patches promptly.
Watch for similar logging flaws in other system components as Apple continues to harden iOS privacy boundaries.
Continue reading
More in this thread
Over 300k Interrail Users Advised to Replace Passports After Eurail Data Leak Appears on Dark Web
Peter Olaleru
Apple patches iOS bug that exposed deleted Signal chats to law enforcement
Peter Olaleru
South Africa’s Data Breach Epidemic: Every Three Hours, Costs Soar to R70.2m
Peter Olaleru
Conversation
Reader notes
Loading comments...