VulnerabilitiesHIGH

Apple Issues Backported Patches for iOS 18 Against DarkSword

Featured image for Apple Issues Backported Patches for iOS 18 Against DarkSword
WRWired Security
iOS 18DarkSwordAppleiPhoneiOS 26
🎯

Basically, Apple is fixing security issues for older iPhones without forcing users to upgrade to the latest version.

Quick Summary

Apple is rolling out backported patches for iOS 18 to combat the DarkSword hacking tool. Millions of iPhone users can now secure their devices without upgrading to iOS 26. This change highlights the growing threat of sophisticated hacking techniques targeting older software versions.

What Happened

Apple has taken a surprising step by releasing backported patches for iOS 18 to protect users from the DarkSword hacking tool. This decision marks a significant shift in Apple's typical approach, which has traditionally required users to upgrade to the latest iOS version for security updates. The DarkSword technique, capable of silently taking over iPhones running iOS 18, was revealed by researchers from Google and cybersecurity firms. As many as 25% of iPhone users were still on iOS 18 as of February, prompting Apple to act.

Previously, Apple had only provided patches for older devices incompatible with iOS 26. Now, users of iOS 18 will receive updates automatically if they have auto-update enabled. This move aims to protect those who have resisted upgrading due to dissatisfaction with newer features or compatibility issues with specific apps.

Who's Affected

Millions of iPhone users running iOS 18 are at risk due to the DarkSword hacking tool. The tool has been linked to various hacker groups, including those involved in espionage and cryptocurrency theft, targeting users in countries like Malaysia, Saudi Arabia, Turkey, and Ukraine. The fact that DarkSword was made available on platforms like GitHub has only increased its accessibility for malicious actors. Many users have expressed frustration over Apple's previous lack of support for older versions, feeling pressured to upgrade despite their preferences.

What Data Was Exposed

The DarkSword hacking tool exploits vulnerabilities in iOS 18, allowing hackers to gain unauthorized access to devices. This could lead to the compromise of personal data, including sensitive information and financial details. The fact that the tool was left in a reusable state on compromised websites has made it easier for hackers to repurpose it for their own attacks. As the tool becomes more widely known, the risk of data exposure for iOS 18 users grows significantly.

What You Should Do

If you are an iOS 18 user, it is crucial to ensure that your device is set to automatically receive updates. If you do not have auto-update enabled, consider updating to the latest patched version of iOS 18 or upgrading to iOS 26 for enhanced security features. Staying informed about the latest security threats and updates is essential for protecting your personal data. Apple's recent decision to backport patches is a positive step, but users must remain vigilant to avoid falling victim to evolving hacking techniques.

🔒 Pro insight: Apple's backporting decision underscores the urgency of addressing vulnerabilities in older iOS versions amid rising threats like DarkSword.

Original article from

WRWired Security· Andy Greenberg
Read Full Article

Related Pings

HIGHVulnerabilities

CVE-2026-20929 - Detecting Kerberos Authentication Relay

A new vulnerability, CVE-2026-20929, allows attackers to exploit Kerberos authentication via DNS CNAME abuse. This poses significant risks to Active Directory environments. Organizations must patch systems and monitor for unusual authentication patterns to mitigate these threats.

CrowdStrike Blog·
CRITICALVulnerabilities

CVE-2025-53521 - F5 BIG-IP APM Vulnerability Exploited

F5 has reclassified a vulnerability in BIG-IP APM as critical, allowing unauthenticated remote code execution. Organizations must upgrade to the latest versions to mitigate risks. Immediate action is essential to protect sensitive data.

Arctic Wolf Blog·
CRITICALVulnerabilities

GIGABYTE Control Center - Critical File Write Vulnerability

A critical vulnerability in GIGABYTE Control Center allows remote attackers to write files and execute code. Users must upgrade to the latest version to protect their systems. This flaw poses significant risks for both individuals and organizations.

BleepingComputer·
CRITICALVulnerabilities

Telegram Zero-Click Vulnerability - Critical Device Threat

A critical zero-click vulnerability in Telegram could allow hackers to take over devices. Both individual users and businesses are at risk. Immediate action is needed to protect sensitive data.

SC Media·
HIGHVulnerabilities

Vim and Emacs RCE Vulnerabilities Found by Claude AI

Claude AI has uncovered serious RCE vulnerabilities in Vim and GNU Emacs. Users are at risk when opening crafted files. Immediate updates and caution are essential to stay safe.

BleepingComputer·
HIGHVulnerabilities

Citrix NetScaler ADC Bug - Added to CISA Exploit List

A critical vulnerability in Citrix NetScaler ADC has been added to CISA's exploit list. This bug poses significant risks, with thousands of appliances exposed online. Organizations must act quickly to patch and secure their systems.

SC Media·