How mobile attackers could gaslight iPhone users, allowing the perfect cover for post-exploitation malicious activity.