iPhone Security Issue Opens Door to SMS Spoofing - MacRumors
Skip to Content

iPhone Security Issue Opens Door to SMS Spoofing

ios messages iconJailbreak hacker and security researcher pod2g today revealed a newly-discovered security issue in all versions of iOS that could allow malicious parties to spoof SMS messages, making a recipient think that a message came from a trusted sender when it in fact came from the malicious party.

The issue is related to iOS's handling of User Data Header (UDH) information, an optional section of a text payload that allows users to specify certain information such as changing the reply-to number on a message to something other than the sending number. The iPhone's handling of this optional information could leave recipients open to targeted SMS spoofing attacks.

In the text payload, a section called UDH (User Data Header) is optional but defines lot of advanced features not all mobiles are compatible with. One of these options enables the user to change the reply address of the text. If the destination mobile is compatible with it, and if the receiver tries to answer to the text, he will not respond to the original number, but to the specified one.

Most carriers don't check this part of the message, which means one can write whatever he wants in this section : a special number like 911, or the number of somebody else.

In a good implementation of this feature, the receiver would see the original phone number and the reply-to one. On iPhone, when you see the message, it seems to come from the reply-to number, and you [lose] track of the origin.

pod2g highlights several ways in which malicious parties could take advantage of this flaw, including phishing attempts linking users to sites collecting personal information or spoofing messages for the purposes of creating false evidence or gaining a recipient's trust to enable further nefarious action.

In many cases the malicious party would need to know the name and number of a trusted contact of the recipient in order for their efforts to be effective, but the phishing example shows how malicious parties could cast broad nets hoping to snare users by pretending to be a common bank or other institution. But with the issue resulting in recipients being shown the reply-to address, an attack could be discovered or thwarted simply by replying to the message, as the return message would go to the familiar contact rather than the malicious one.

Related Forum: iPhone

Popular Stories

Apple Event Logo

Apple to Launch These 15+ New Products Later This Year

Friday March 27, 2026 2:03 pm PDT by
March has been an incredibly busy month for Apple, with the company unveiling more than 10 new products and accessories. We said hello to the MacBook Neo at the start of the month, and we bid farewell to the Mac Pro at the end of it. Nevertheless, there is still a lot more to come this year. Beyond the usual annual updates to iPhones and Apple Watches, Apple's all-new smart home hub is...
iOS 26

iOS 26.4 Adds Two New Features to CarPlay

Tuesday March 24, 2026 1:55 pm PDT by
iOS 26.4 was released today, and it includes a couple of new features for CarPlay: an Ambient Music widget and support for voice-based chatbot apps. To update your iPhone 11 or newer to iOS 26.4, open the Settings app and tap on General → Software Update. CarPlay will automatically offer the new features so long as the iPhone connected to your vehicle is running iOS 26.4 or later....
Mac Pro Feature Teal

Apple Confirms Mac Pro Is Dead, No Future Models Planned

Thursday March 26, 2026 2:04 pm PDT by
Apple has discontinued the Mac Pro and has removed the machine from its website, reports 9to5Mac. Apple said it does not plan to design a new version of the Mac Pro, and no new model will be coming in the future. The Mac Pro was last updated in 2023, which was when Apple added an M2 Ultra Apple silicon chip, but the chassis has not been refreshed since 2019. Apple redesigned the Mac Pro to...

Top Rated Comments

178 months ago
I think we could use a slight rewrite of the article. It didn't say "malicious party" nearly often enough for me.
Score: 9 Votes (Like | Disagree)
gotluck Avatar
178 months ago


Nope. :apple:

But i'm not surprised it didn't come from someone legit.

Pod2g is quite legit in my book.
Score: 6 Votes (Like | Disagree)
miniConvert Avatar
178 months ago
This makes no sense. You don't need to use UDH tricks to 'spoof' the sender ID on a text message, you just set whatever sender ID you want to use. Any text message can contain up to 16 digits or 11 alphanumeric characters of sender ID, and there's absolutely nothing that ensures this data is somehow verified or official.

Just as with an email you can, technically, originate it from wherever the hell you like, so can you with a text message.

This 'discovery' is not a discovery at all. In fact, it doesn't seem to be a problem at all. It would only be a problem if the sender ID displayed on the iPhone could be one thing, but the destination of the reply text messages could actually be something else that the user had no knowledge of. Correct me if I'm wrong, but in this instance the user is fully aware of the number they're texting. So no problem.

And yes, I know SMS.
Score: 6 Votes (Like | Disagree)
Uncle Ruckus Avatar
178 months ago
Apple get you act together.

Uncle Ruckus no relations.
Score: 6 Votes (Like | Disagree)
miniConvert Avatar
178 months ago
Agree with this. You are correct, this is not possible. When a reply-to address is specified iOS displays that and ignores the sender.
Yeah, I'm pretty sure this story is without merit and should be taken down. Simply a misunderstanding/lack of understanding about how SMS works.
Score: 5 Votes (Like | Disagree)
theBB Avatar
178 months ago
It is easy to spoof caller ID and fool every phone on earth. How is this any more dangerous?
Score: 5 Votes (Like | Disagree)