iOS/iPadOS Standalone Analyzer

Protecting Multiple Governments from Nation-State Developed Implants & Commercial Spyware

Competing iOS security apps and existing Mobile Device Management (MDM) and  Mobile Threat Defense (MTD) solutions cannot detect advanced implants/spyware used by nation states, if they could you wouldn't see the attacks in the news. Due to iOS "sandboxing" of apps, including for MDM or MTD solutions, they cannot even access the data required to perform security analysis.

Existing Windows or macOS based solutions, where the iOS device is tethered to a laptop, only look for already public Indicators of Compromise (IoCs) and are a headache to use. Public IoCs might be useful for detecting historical attacks from a small number of threat actors but provide zero protection from the wide range of threat actors conducting sophisticated attacks today. IoCs can also be modified to be specific to each victim making public ones useless even for detecting historical incidents.

You want a solution that can detect the latest implants/spyware from the most advanced threat actors targeting your user base while ensuring no device data or knowledge of detected compromises leaves your government.

Numbers Station's iOS/iPadOS Standalone Analyzer was developed to address these requirements and is already used by multiple governments to protect the devices of senior leadership as well as regular agency/department staff. Our government clients have already discovered active operations against their devices running the latest versions of iOS.


The tool can run on a fully "air-gapped" network as well as a laptop with no external network access. Results can be tailored with varying levels of sensitivity or alerting for different users ranging from non-experts to cyber security forensic experts.


Use Cases


Subscription to the Service Includes



For further information, please contact gov@numbersstation.app from an email address tied to a government domain.