HomeCyber SecurityHackers Exploit Apple Security Flaw, Take Complete Control of Devices!

Hackers Exploit Apple Security Flaw, Take Complete Control of Devices!

Apple Security – Actively Exploited – Apple enthusiasts, we’ve got some crucial news: there’s a pressing need to update your iPhones, iPads, and Macs ASAP. Two security vulnerabilities have surfaced, posing a serious threat by granting attackers complete control over your beloved Apple devices. The urgency here is real, as credible reports confirm that hackers are already exploiting these vulnerabilities.

Identifying the Vulnerabilities

Let’s break it down. The first vulnerability dives deep into the operating system’s core, affecting the kernel—the shared layer across all Apple devices. The second vulnerability targets WebKit, the underlying technology powering the Safari web browser. Apple has acknowledged that these issues have already seen active exploitation by hackers, though specific details remain undisclosed. The disclosure of these vulnerabilities comes courtesy of an anonymous researcher or group.

If you’re rocking an iPhone from 2015 onward, an iPad released since 2014, or a Mac running macOS Monterey, it’s time to take action. Navigate to your settings menu on mobile or select “software update” in the “about this Mac” section on your computer to download the critical update.

Expert Insights about Apple Security Flaw

Rachel Tobac, CEO of SocialProof Security, breaks it down for us: these vulnerabilities could hand a hacker “full admin access to the device,” essentially allowing them to execute code as if they were you. That’s serious business.

Now, who needs to be especially vigilant? Activists, journalists, anyone in the public eye—the targets of sophisticated nation-state spying. Updating your software is not just a suggestion; it’s a security imperative.

Zero-Day Bugs and Dark Web Transactions

Until the fix rolled out, these vulnerabilities fell under the “zero-day” category, meaning there was zero days of protection against them. On the dark web, these vulnerabilities are currency, fetching hundreds of thousands, even millions of dollars. Zerodium, a notable cyberweapon broker, is willing to pay up to $500,000 for a Safari exploit and up to $2 million for a fully developed iPhone-hacking malware.

Commercial Spyware and Government Involvement

Enter commercial spyware companies like NSO Group, notorious for exploiting such vulnerabilities. Governments, especially in Europe and North America, are the big spenders here. NSO Group’s spyware, though bl*cklisted by the US commerce department, has a notorious history of targeting journalists, dissidents, and human rights activists across Europe, the Middle East, Africa, and Latin America.

Security researcher Will Strafach highlights the seriousness of these vulnerabilities, stressing the lack of technical analysis. Apple, while patching these flaws, has faced similar challenges in the past, with reports of exploitation emerging on numerous occasions. Stay vigilant, update your devices, and keep the hackers at bay.

A cybersecurity practitioner with more than 5 years of experience in the cybersecurity world. Has an interest in creating simple blog websites, learning about SEO and graphic design, writing, AI, and understanding the concepts of journalism. Intentionally created this website to make the world of cybersecurity more engaging by combining it with journalistic principles and presenting cybersecurity stories that are easy to understand, which can help anyone who wants to develop in the cybersecurity world.



Please enter your comment!
Please enter your name here

3 × three =

Most Popular


- Advertisement -