These cases highlight how attacks can reach everyday users — learn the patterns.
Pegasus — powerful spyware targeting phones
Investigations found the NSO Group’s Pegasus spyware used to compromise hundreds of phones (journalists, activists, and others). In some cases Pegasus used “zero-click” iMessage exploits to infect iPhones without user interaction. Researchers and forensic reports exposed multiple governments’ use of the tool and Apple released emergency iOS updates to block the exploit. Citation ‡
XcodeGhost — malicious developer tool infected iOS apps
In 2015, a counterfeit Xcode distribution led to hundreds of infected iOS apps in the App Store (developers used an altered Xcode binary). Apple removed affected apps and asked developers to rebuild with official Xcode. The attack showed supply-chain risks: not just bad apps, but compromised developer tools. Citation ‡
Joker & other Android trojans hiding in Play Store apps
Malware families such as “Joker” (also called Bread) repeatedly slipped into Google Play disguised as legitimate apps and subscribed users to unwanted premium services or stole data. Security firms and Google removed many variants, but new ones reappeared—illustrating why permissions and verified publishers matter. Citation ‡
Popular app with hidden adware / trojan behavior
Widely used Android apps have occasionally bundled Trojan droppers or malicious ad modules (researchers found this in apps such as CamScanner in 2019), underlining the value of vetting apps and checking developer news. Citation ‡
Sources and investigations cited above include academic and industry researchers and government advisories. See the source list at the bottom for direct links.