VulnerabilitiesHIGH

Apple Expands iOS 18 Security Updates Against DarkSword Threat

Featured image for Apple Expands iOS 18 Security Updates Against DarkSword Threat
IMInfosecurity Magazine+3 more
DarkSwordiOS 18Appleexploit kitmalwareiOSsecurity updatescybersecurity
🎯

Apple is making sure that older iPhones and iPads can still get important security updates to protect against a sneaky hacking tool called DarkSword. This tool can steal your information just by visiting a bad website. So, if you have an older device, make sure to update it to stay safe!

Quick Summary

Apple has expanded its iOS 18.7.7 security update to more devices to protect against the DarkSword exploit kit, which has been linked to state-sponsored attacks and commercial surveillance.

What Happened

Apple has expanded the availability of iOS 18.7.7 and iPadOS 18.7.7 to a wider range of devices to safeguard users from the DarkSword exploit kit, a sophisticated hacking tool used in targeted cyber-attacks. The update, originally released on March 24, 2026, allows devices still running iOS 18 to receive crucial security patches without needing to upgrade to the latest operating system. On April 1, Apple broadened access to ensure more users could automatically receive protections against web-based attacks associated with DarkSword.

The Flaw

The DarkSword exploit targets devices running iOS versions between 18.4 and 18.7, exploiting a chain of six vulnerabilities in WebKit, Safari, the dynamic loader, and the kernel. This full-chain exploit can allow attackers to fully compromise devices with minimal user interaction, simply by visiting a compromised website or malicious advertisement in Safari. Security researchers have linked DarkSword to at least two Russian state-sponsored groups and noted its use by commercial surveillance vendors, raising concerns about the potential for widespread data theft.

What's at Risk

Roughly 200 million devices running vulnerable iOS versions were estimated to be at risk when the DarkSword exploit was disclosed. The vulnerabilities can lead to severe consequences, including kernel code execution, keychain access, and activation lock bypass, which can compromise user data and device integrity.

Patch Status

The expanded update now covers a wide range of iPhones and iPads, including:

  • iPhone XR through iPhone 16 models
  • iPhone SE (2nd and 3rd generation)
  • Multiple iPad mini, iPad Air, and iPad Pro models
  • iPad (7th generation)

Users with automatic updates enabled will receive the patch automatically, while others can manually update to the patched iOS 18 version or opt for the latest iOS 26.

Immediate Actions

Apple has taken the unusual step of continuing to deliver updates to older operating systems, which is not typical practice. Users are encouraged to check for updates by going to Settings > General > Software Update. For those who suspect they may be targets of such attacks, enabling Lockdown Mode is advisable, which enhances security at the cost of usability. Additionally, users should consider employing real-time anti-malware protection, avoiding unsolicited links, and regularly reviewing app permissions to safeguard their devices.

Conclusion

The emergence of the DarkSword exploit kit underscores the ongoing risks faced by users of older iOS versions. With Apple’s proactive measures to expand security updates, users are urged to prioritize their device security to mitigate the risks associated with this and similar threats.

The DarkSword exploit kit represents a significant threat, particularly given its linkage to state-sponsored actors and the scale of potential vulnerabilities. Apple's decision to backport security updates to older devices reflects a growing recognition of the need for continued support for users who may not upgrade regularly.

Original article from

IMInfosecurity Magazine
Read Full Article

Also covered by

MAMalwarebytes Labs

Apple expands “DarkSword” patches to iOS 18.7.7

Read Article
SESecurityWeek

Apple Rolls Out DarkSword Exploit Protection to More Devices

Read Article
SCSC Media

Apple expands updates to iOS 18 devices affected by DarkSword exploit

Read Article

Related Pings

CRITICALVulnerabilities

CVE-2025-55182 - Hackers Breach 766 Next.js Hosts

Hackers have exploited a critical vulnerability in Next.js, breaching 766 hosts and stealing sensitive credentials. Organizations must take swift action to mitigate risks and secure their systems.

The Hacker News·
HIGHVulnerabilities

OpenSSH Vulnerabilities - Security Advisory Released

OpenSSH has issued a security advisory for vulnerabilities in versions prior to 10.3. Users need to update to the latest version to protect their systems. This advisory highlights critical risks that could lead to unauthorized access. Stay secure by applying the necessary updates.

Canadian Cyber Centre Alerts·
HIGHVulnerabilities

Progress ShareFile - Security Vulnerability Advisory Released

Progress has issued a security advisory for ShareFile vulnerabilities. Users must update to versions v5.12.4 or later to protect their data. This is crucial for maintaining security.

Canadian Cyber Centre Alerts·
HIGHVulnerabilities

Mongoose Vulnerabilities - Cesanta Issues Security Advisory

Cesanta has issued a security advisory for Mongoose, affecting versions 7.0 to 7.20. Users must update to safeguard against vulnerabilities. Don't wait—protect your systems now!

Canadian Cyber Centre Alerts·
HIGHVulnerabilities

Cisco Patches Critical and High-Severity Vulnerabilities

Cisco has patched critical vulnerabilities that could allow attackers to bypass authentication and gain system access. Organizations using Cisco products are urged to update immediately to avoid risks.

Security Affairs·
CRITICALVulnerabilities

Critical Vulnerability Found in Claude Code After Source Leak

A critical vulnerability in Claude Code was discovered shortly after its source code leak. This flaw could allow attackers to bypass security measures and steal sensitive credentials, posing a significant risk. Developers must act quickly to protect their systems.

SecurityWeek·