iOS/iPadOS Standalone Analyzer

Protecting Governments from Nation-State Developed Implants & Commercial Spyware

Our solutions currently protect the personal and state owned mobile devices of heads of state, prime ministers and cabinet officials from the most advanced cyber threats. The compromise of such a device could be catastrophic for your government and result in national security threats and weakened positions in international and trade negotiations. Attacks can also cause havoc via election interference and other attacks on democratic institutions. The risk is too high to ignore.


Why Network Monitoring Fails

Vendors of network monitoring solutions focus almost entirely on threats to Windows and Linux, not iOS/iPadOS devices. Due to extensive use of TLS certificate pinning by mobile apps, there is zero visibility of the threats. The initial exploitation vectors are also often delivered via apps that utilize end-to-end encryption, such as messaging apps. Yet another layer of encryption making network monitoring insufficient to detect threats or compromises.


Why Competing Apps & MDM/MTD Solutions Fail

Competing iOS security apps and Mobile Device Management (MDM) and Mobile Threat Defense (MTD) solutions cannot detect advanced implants/spyware used by nation states, if they could you wouldn't see the attacks in the news. Due to iOS "sandboxing" of apps, including for MDM or MTD solutions, these apps cannot even access the data required to perform security analysis. They simply ensure compliance to security policies, such as is a passcode enabled, is the device jailbroken and is the user running the latest version of iOS. A device that passes all of those checks is still vulnerable to nation-state threat actors.

The Android operating system can provide additional access to apps that a user can authorize that do allow for more security screening. Vendors often tout the features of their Android solution without mentioning the severe limitations of their iOS solution.

Competing Windows or macOS based solutions, where the iOS device is tethered to a laptop, only look for already public Indicators of Compromise (IoCs). Public IoCs might be useful for detecting historical attacks from a small number of threat actors but provide zero protection from the wide range of threat actors conducting sophisticated attacks today. IoCs can also be modified to be specific to each victim making public ones useless even for detecting historical incidents.


Our Solution

You want a solution that can detect the latest implants/spyware from the most advanced threat actors targeting your user base while ensuring no device data or knowledge of detected compromises leaves your government.

Numbers Station's iOS/iPadOS Standalone Analyzer was developed to address these requirements and is already used by multiple NATO governments to protect the devices of senior leadership as well as regular agency/department staff. Our government clients have already discovered active operations against their devices running the latest versions of iOS.


The tool can run on a fully "air-gapped" network as well as a laptop with no external network access. Results can be tailored with varying levels of sensitivity or alerting for different users ranging from non-experts to cyber security forensic experts.


Our tools do not rely on a list of known IoCs to check against, instead they analyze system diagnostic data to find anomalies. These anomalies are then analyzed and scored in level of severity and reported to the user. We do not require a list of already known IoCs since they would standout as anomalous anyway.


Use Cases


Subscription to the Service Includes



For further information, please contact gov@numbersstation.app from an email address tied to a government domain.