crypto news

Apple Patches Zero Plick Plick Exploit Whatsing Crypto Users star-news.press/wp

Apple urges users to update their devices immediately to correct the security vulnerability for the zero clicking, which allowed the attackers to settle iPhone, iPads and MACS devices, a defect that poses increasing risks for encrypted currency holders.

On Thursday consultativeApple said the weakness of the image processing allowed the advanced actors to waive the Apple devices. Weak detection page Notes It was fixed as part of MacOS Sonoma 14.7.8, MacOS Ventura 13.7.8, iPados 17.7.10, MacOS Sequoia 15.6.1, iOS 18.6.2 and iPados 18.6.2 updates.

The company said: “Apple is aware of a report that this problem may have been exploited in a very advanced attack against specific targeted individuals.”

Cyber ​​security experts have warned that the defect is particularly dangerous for those who are encrypting, because they are highly exposed to electronic attacks. Access to integrated encryption systems directly leads to financial gains through irreversible transactions for the attacker, which leads to high -motivated categories targeting this category.

Juliano Rizu, founder and director of Cobersecurity Coinspect, told Cointelegraph that this is a zero -click security vulnerability that does not require user interaction and “the supplement that is delivered via IMessage can automatically and leads to a compromise of the device,” Cobersecurcecurce Coinspect told Cointelegraph. The attackers can take advantage of access to the device to access the portfolio data.

Related to: Bitcoiner loses $ 91 million in the social engineering attack: Zachbt

Details of apples

Weakness affects the Apple I/O image rangeWhich allows the applications to read and write most of the image file formats. Because of the improper implementation, a harmful image allows Memory outside the border writing access.

In other words, the attackers can take advantage of this security vulnerability to write to the areas of the device that must be accessed. Such a case, in the hands of a particularly advanced striker, can display the security of the device by allowing the attackers to implement code on the target devices.

The device’s memory has all the programs currently being implemented, including critical programs. The ability to write to the adopted memory allows the attackers to change how to run other programs and implement their own instructions.

Related to: Ethereum Core Dev wallet drained by extension of harmful artificial intelligence

Tip for encryption holders

RIZZO advised the high -value goals that have used weak devices for the main storage or signature to deport to new wallet keys if there is any sign of a compromise or “if there is any evidence of targeting” on the device storing accreditation data:

“The accurate steps depend on the details of the attack, but the key is to maintain calm, document a clear plan, and start securing the initial accounts (email, cloud) that attackers can use to reset the password or more access. Patching is very important, but pending the completion of the completion should never delay the immediate account.”

For ordinary individuals, Rizzo pointed out that “the examination of system records can show in theory anomalies, but it is difficult to explain these data in practice.” He said that the sellers like Apple are in a good position to detect exploitation and contact the victims directly.

https://www.youtube.com/watch?

magazine: Coinbase Hack shows that the law may not protect you: this is the reason

https://images.cointelegraph.com/cdn-cgi/image/format=auto,onerror=redirect,quality=90,width=1200/https://s3.cointelegraph.com/uploads/2025-08/0198d154-3b16-770b-9a70-b28104573b26

2025-08-22 12:15:00

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button