After gaining access, the attacker would then wait until iPhone next rebooted and begin implanting malware.

An attacker who got hands-on time with the victims iPhone could alternatively use the attack as a lockscreen bypass.

They also need to kill the access Control Center from the phones lockscreen.

Your iPhones are vulnerable to hacking due to Airdrop vulnerability

spot_img

source: www.techworm.net