VulnerabilitiesHIGH

Apple Expands DarkSword Patches to iOS 18.7.7

Featured image for Apple Expands DarkSword Patches to iOS 18.7.7
MWMalwarebytes Labs
DarkSwordiOS 18.7.7AppleWebKitzero-day
🎯

Basically, Apple fixed serious security holes in iPhones that could let hackers take control just by visiting a bad website.

Quick Summary

Apple has broadened its DarkSword patches to iOS 18.7.7, fixing critical vulnerabilities. This update is crucial for millions of users at risk of device compromise. Ensure your device is secure by updating now!

What Happened

Apple has expanded its security measures by releasing patches for the DarkSword exploit kit in its iOS and iPadOS 18.7.7 updates. Initially rolled out on March 24, 2026, these patches were aimed at a limited number of older devices. However, due to the emergence of real-world DarkSword attacks, Apple decided to broaden the update to protect more users.

The Flaw

DarkSword is a sophisticated exploit kit that leverages a series of vulnerabilities in Apple's WebKit, Safari, and even the device's kernel. This exploit chain can lead to full device compromise simply by visiting a malicious website. The vulnerabilities have been active in the wild since at least November 2025, primarily exploited by commercial spyware vendors and state-sponsored actors.

What's at Risk

With hundreds of millions of devices potentially exposed, even regular users without a history of sensitive activities became vulnerable. The exploit can compromise personal data, including photos, chats, and financial information, without any user interaction beyond loading a webpage. This makes it a particularly insidious threat, as it can affect anyone who visits a compromised site.

Patch Status

The latest update, iOS 18.7.7, includes fixes for several vulnerabilities that are part of the DarkSword exploit chain. Users of older devices who previously did not receive updates now have access to these critical patches. Apple has made it clear that users should prioritize updating their devices to mitigate the risk.

What You Should Do

To ensure your device is protected, follow these steps:

  1. Check for Updates: Go to Settings > General > Software Update and install any available updates.
  2. Turn on Automatic Updates: This will help keep your device secure without requiring manual checks.
  3. Consider Lockdown Mode: If you handle sensitive information, enabling Lockdown Mode can provide extra protection against targeted attacks.
  4. Stay Informed: Regularly review your device's security settings and be cautious about the websites you visit.

Additional Safety Tips

  • Use real-time anti-malware protection to block malicious sites.
  • Avoid clicking links in unsolicited messages.
  • Utilize content blockers in Safari to reduce exposure to harmful content.
  • Move sensitive assets to hardware wallets and enable multi-factor authentication on financial accounts.

By taking these proactive steps, you can significantly reduce your risk of falling victim to the DarkSword exploit and similar threats. Stay safe and keep your devices updated!

🔒 Pro insight: The expansion of these patches highlights the urgent need for users to prioritize updates, especially against zero-day vulnerabilities like DarkSword.

Original article from

MWMalwarebytes Labs
Read Full Article

Related Pings

CRITICALVulnerabilities

CVE-2025-55182 - Hackers Breach 766 Next.js Hosts

Hackers have exploited a critical vulnerability in Next.js, breaching 766 hosts and stealing sensitive credentials. Organizations must take swift action to mitigate risks and secure their systems.

The Hacker News·
HIGHVulnerabilities

OpenSSH Vulnerabilities - Security Advisory Released

OpenSSH has issued a security advisory for vulnerabilities in versions prior to 10.3. Users need to update to the latest version to protect their systems. This advisory highlights critical risks that could lead to unauthorized access. Stay secure by applying the necessary updates.

Canadian Cyber Centre Alerts·
HIGHVulnerabilities

Progress ShareFile - Security Vulnerability Advisory Released

Progress has issued a security advisory for ShareFile vulnerabilities. Users must update to versions v5.12.4 or later to protect their data. This is crucial for maintaining security.

Canadian Cyber Centre Alerts·
HIGHVulnerabilities

Mongoose Vulnerabilities - Cesanta Issues Security Advisory

Cesanta has issued a security advisory for Mongoose, affecting versions 7.0 to 7.20. Users must update to safeguard against vulnerabilities. Don't wait—protect your systems now!

Canadian Cyber Centre Alerts·
HIGHVulnerabilities

Cisco Patches Critical and High-Severity Vulnerabilities

Cisco has patched critical vulnerabilities that could allow attackers to bypass authentication and gain system access. Organizations using Cisco products are urged to update immediately to avoid risks.

Security Affairs·
CRITICALVulnerabilities

Critical Vulnerability Found in Claude Code After Source Leak

A critical vulnerability in Claude Code was discovered shortly after its source code leak. This flaw could allow attackers to bypass security measures and steal sensitive credentials, posing a significant risk. Developers must act quickly to protect their systems.

SecurityWeek·