Google Project Zero researcher Ian Beer has published an in-depth analysis of the BLASTPASS zero-click iMessage exploit.
The exploit allowed attackers to compromise iPhones and iPads without any user input, by sending malicious images via iMessage.
Beer's analysis highlights the need for sandboxing to treat all incoming attacker-controlled data as untrusted, rather than simply trusting file extensions.
While the BLASTPASS exploit has been patched by Apple, the analysis suggests similar attacks may continue to be developed in the future.