Back

Apple Issues Emergency Patch for DarkSword Exploit Affecting iOS 18 Users

Severity: High (Score: 74.0)

Sources: Theverge, Aol, Tweaktown, Digitaltrends, Iphoneincanada.Ca

Summary

Apple has released a critical security patch, iOS 18.7.7, to address the DarkSword exploit affecting iPhones running iOS 18.4 to 18.7. This exploit allows attackers to remotely install malware simply by having users visit compromised websites. Despite the availability of iOS 26, which offers enhanced security, many users have resisted upgrading due to its controversial Liquid Glass interface, leaving approximately 16% to 20% of iPhones vulnerable. The DarkSword toolkit was leaked online, increasing the urgency for Apple to act. The patch is a rare move for Apple, which typically does not backport security updates to older iOS versions. Users can manually install the update via Settings or receive it automatically if enabled. The attack has been linked to phishing campaigns and has affected users globally. Apple has also issued updates for older iOS versions to protect devices unable to upgrade to the latest OS. Key Points: • Apple has released iOS 18.7.7 to patch the DarkSword exploit for older iPhones. • The DarkSword exploit can compromise devices simply by visiting malicious websites. • Approximately 16% to 20% of iPhones are still running iOS 18, leaving them vulnerable.

Key Entities

  • Data Breach (attack_type)
  • Malware (attack_type)
  • Phishing (attack_type)
  • Zero-day Exploit (attack_type)
  • Apple (company)
  • China (country)
  • Malaysia (country)
  • Saudi Arabia (country)
  • Turkey (country)
  • Ukraine (country)
  • DarkSword (malware)
  • Coruna (malware)
  • T1041 - Exfiltration Over C2 Channel (mitre_attack)
  • T1189 - Drive-by Compromise (mitre_attack)
  • T1566.002 - Spearphishing Link (mitre_attack)
  • T1567 - Exfiltration Over Web Service (mitre_attack)
  • IOS (platform)
  • IPadOS (platform)
  • IPhone (platform)
  • DarkSword Toolkit (tool)
Loading threat details...

Threat Not Found

The threat cluster you're looking for doesn't exist or has been removed.

Return to Feed