FaceTime Bug That Lets People Spy on Others Demoed in Video [Updated] - MacRumorsOpen MenuShow RoundupsShow Forums menuVisit ForumsOpen Sidebar
Skip to Content

FaceTime Bug That Lets People Spy on Others Demoed in Video [Updated]

There's a major issue affecting FaceTime right now, which all MacRumors readers should be aware of. A bug with Group ‌FaceTime‌ can let someone force a ‌FaceTime‌ call with you, giving them access to your iPhone, iPad, or Mac's video and audio even when you don't accept the ‌FaceTime‌ call.

In the video below, we demonstrate how the bug works. We do not condone MacRumors readers invading peoples' privacy, and these video is meant to make it clear how simple it is to exploit this bug to emphasize its seriousness.


As outlined in our original post on the issue, this ‌FaceTime‌ bug is very easy to exploit. All someone needs to do is call you and then add their own number to the ‌FaceTime‌ call to force a connection with you.

From there, they can hear your audio, even though on your end, it looks like the call wasn't accepted yet. If you hit the power button to make the call go away, it gives the person on the other end access to your camera. This bug can be initiated on an iPhone and it affects iOS and macOS devices running current software, including iOS 12.2.

This is a huge privacy issue and while Apple says a fix is coming "later this week," iPhone and Mac users concerned about spying should turn off FaceTime all together. Enabling Do Not Disturb also appears to work as a preventative measure.

Update: Apple appears to have temporarily addressed the issue by disabling Group ‌FaceTime‌ calls server side. On Apple's System Status page, Group ‌FaceTime‌ is listed as unavailable.

Popular Stories

Apple Card iPhone 16 Pro Feature

Apple Card Promo to Offer Free AirPods Pro 3

Friday May 15, 2026 8:59 am PDT by
Starting as early as next week, customers who sign up for an Apple Card at Apple's retail stores in the U.S. will receive $249 cash back when they purchase AirPods Pro 3, according to Bloomberg's Mark Gurman. The promotion has yet to be officially announced by Apple, so exact terms and conditions are not available at this time. AirPods Pro 3 are priced at $249 in the U.S., so customers who...
Apple WWDC25 iOS 26 CarPlay Light mode 250609

Six Popular iPhone Apps Now Available on CarPlay

Thursday May 14, 2026 9:10 am PDT by
Apple's CarPlay system for accessing iPhone apps on a vehicle's dashboard screen has received six popular apps in recent weeks: ChatGPT, Perplexity, Grok, Google Meet, WhatsApp, and the indie artist streaming platform Audiomack. Make sure you have the latest version of each app and they will automatically appear on CarPlay. ChatGPT Starting with iOS 26.4, CarPlay supports voice-based...
ipad mini 7 blue

OLED iPad Mini: Release Date, Pricing, and What to Expect

Thursday May 14, 2026 5:08 am PDT by
According to the latest rumors, Apple is close to launching its next-generation iPad mini. So what should we expect from the successor to the iPad mini 7 that Apple released over a year ago? Read on to find out. Processor and Performance Apple is working on a next-generation version of the iPad mini (codename J510/J511) that features the A19 Pro chip, according to information found in code...

Top Rated Comments

jclo Avatar
95 months ago
Why show a video of how to replicate this issue? Why is that necessary? We’re already aware of the problem; no need to show people how to replicate it. This is a security and a privacy problem.
It's not meant to be an instructional video, it's to show people who aren't aware how easy it is to exploit so they can understand the seriousness and disable FaceTime. Anyone who wanted to exploit it could easily find the steps on virtually any other site because it's absolutely everywhere now. There's no hiding the execution of a bug like this. Might as well spread awareness so MR readers can be safe.
Score: 17 Votes (Like | Disagree)
drinkingtea Avatar
95 months ago
Why show a video of how to replicate this issue? Why is that necessary? We’re already aware of the problem; no need to show people how to replicate it. This is a security and a privacy problem.
Score: 7 Votes (Like | Disagree)
Klyster Avatar
95 months ago
MacRumors content image
Score: 6 Votes (Like | Disagree)
simonmet Avatar
95 months ago
It's a bug. Not exactly an earth shattering one like the chip design flaws from last year. A software bug. It'll be fixed. Calm down. Return to your previously planned activities.
It’s concerning to me that bugs of this severity not only occur but do so with some degree of frequency. They are not merely software bugs to calm down about. MacRumors describes it as serious. Every iPhone unlock or remote access/control exploit is a major failure.
Score: 5 Votes (Like | Disagree)
I7guy Avatar
95 months ago
Massive failure after massive failure. Dissappointing, but Cook is in over his head. Not a visionary.
Massive failure after massive failure? Sure there isn't another company you are referring to or hyperbole for hyperboles sake?
Score: 5 Votes (Like | Disagree)
95 months ago
It's a bug. Not exactly an earth shattering one like the chip design flaws from last year. A software bug. It'll be fixed. Calm down. Return to your previously planned activities.
Score: 5 Votes (Like | Disagree)