VulnerabilitiesHIGH

Apple Issues Backported Patches for iOS 18 Against DarkSword

Featured image for Apple Issues Backported Patches for iOS 18 Against DarkSword
WRWired Security·Reporting by Andy Greenberg
📰 3 sources·Summary by CyberPings Editorial·AI-assisted·Reviewed by Rohit Rana
Updated:
🎯

Basically, Apple is fixing security issues for older iPhones without forcing users to upgrade to the latest version.

Quick Summary

Apple is rolling out backported patches for iOS 18 to combat the DarkSword hacking tool. Millions of iPhone users can now secure their devices without upgrading to iOS 26. This change highlights the growing threat of sophisticated hacking techniques targeting older software versions.

What Happened

Apple has taken a surprising step by releasing backported patches for iOS 18 to protect users from the DarkSword hacking tool. This decision marks a significant shift in Apple's typical approach, which has traditionally required users to upgrade to the latest iOS version for security updates. The DarkSword technique, capable of silently taking over iPhones running iOS 18, was revealed by researchers from Google and cybersecurity firms. As many as 25% of iPhone users were still on iOS 18 as of February, prompting Apple to act.

Previously, Apple had only provided patches for older devices incompatible with iOS 26. Now, users of iOS 18 will receive updates automatically if they have auto-update enabled. This move aims to protect those who have resisted upgrading due to dissatisfaction with newer features or compatibility issues with specific apps.

Who's Affected

Millions of iPhone users running iOS 18 are at risk due to the DarkSword hacking tool. The tool has been linked to various hacker groups, including those involved in espionage and cryptocurrency theft, targeting users in countries like Malaysia, Saudi Arabia, Turkey, and Ukraine. The fact that DarkSword was made available on platforms like GitHub has only increased its accessibility for malicious actors. Many users have expressed frustration over Apple's previous lack of support for older versions, feeling pressured to upgrade despite their preferences.

What Data Was Exposed

The DarkSword hacking tool exploits vulnerabilities in iOS 18, allowing hackers to gain unauthorized access to devices. This could lead to the compromise of personal data, including sensitive information and financial details. The fact that the tool was left in a reusable state on compromised websites has made it easier for hackers to repurpose it for their own attacks. As the tool becomes more widely known, the risk of data exposure for iOS 18 users grows significantly.

What You Should Do

If you are an iOS 18 user, it is crucial to ensure that your device is set to automatically receive updates. If you do not have auto-update enabled, consider updating to the latest patched version of iOS 18 or upgrading to iOS 26 for enhanced security features. Staying informed about the latest security threats and updates is essential for protecting your personal data. Apple's recent decision to backport patches is a positive step, but users must remain vigilant to avoid falling victim to evolving hacking techniques.

🔒 Pro insight: Apple's backporting decision underscores the urgency of addressing vulnerabilities in older iOS versions amid rising threats like DarkSword.

Original article from

WRWired Security· Andy Greenberg
Read Full Article

Also covered by

MAMalwarebytes Labs

Apple expands “DarkSword” patches to iOS 18.7.7

Read Article
HEHelp Net Security

DarkSword exploit forces Apple to loosen its patching policy

Read Article
BLBleepingComputer

Apple expands iOS 18 updates to more iPhones to block DarkSword attacks

Read Article

Related Pings

CRITICALVulnerabilities

Fortinet FortiClient EMS - Critical 0-Day Vulnerability Exploited

A critical zero-day vulnerability in FortiClient EMS is actively exploited. Fortinet has released emergency patches and urges immediate action from users.

Cyber Security News·
HIGHVulnerabilities

Video Conferencing Bug - CISA Orders Agencies to Patch

A serious vulnerability in TrueConf video conferencing software is being exploited by Chinese hackers. CISA has mandated a two-week patch deadline for federal agencies. Immediate action is essential to safeguard sensitive data and communications.

The Record·
HIGHVulnerabilities

Post-Deployment Vulnerability Detection - Rethinking Strategies

A new approach to vulnerability detection is needed post-deployment. Many organizations overlook risks from newly disclosed CVEs, leaving systems exposed. Rethinking strategies can enhance security.

OpenSSF Blog·
HIGHVulnerabilities

Mobile Vulnerabilities - Enterprises Struggle with Control

Mobile devices are increasingly vulnerable due to outdated software and hidden threats like Shadow AI. This puts sensitive enterprise data at risk. Organizations must act to secure their mobile environments.

SecurityWeek·
HIGHVulnerabilities

CVE-2026-33691 - OWASP CRS Whitespace Padding Bypass Alert

A new vulnerability in OWASP CRS allows attackers to upload dangerous files by exploiting whitespace in filenames. This affects many web applications, risking severe security breaches. Immediate updates are necessary to protect your systems.

Full Disclosure·
HIGHVulnerabilities

MetInfo CMS Vulnerability - PHP Code Injection Risk

A critical vulnerability in MetInfo CMS could let attackers execute arbitrary PHP code. Versions 7.9, 8.0, and 8.1 are at risk. Stay alert for updates and potential fixes.

Full Disclosure·