Zero-Click iMessage Hack: The “Glass Cage” Exploit That Apple Didn’t See Coming
Discovered in December 2024, the “Glass Cage” zero-click iMessage exploit chain targets iOS 18.2. This sneaky trick lets hackers take over a device with just one malicious PNG image, leading to full control, iCloud Keychain theft, and optional bricking. Apple’s defenses were no match, but at least they patched it—eventually.

Hot Take:
If you thought your iPhone was safe from a PNG image, think again! This “Glass Cage” exploit is like getting a postcard from a hacker that says, “Wish you were here… but you’re not because I bricked your phone!”
Key Points:
- Zero-click iMessage exploit chain dubbed “Glass Cage.”
- Targets iOS 18.2, enabling remote code execution and device bricking.
- Bypasses Apple’s security defenses, including BlastDoor and WebKit sandboxing.
- Involves two CVEs: CVE-2025-24085 and CVE-2025-24201.
- Apple patched vulnerabilities, but original discoverer not credited.
Already a member? Log in here