Apple on Monday released a new version of the iPhone and iPad’s operating systems to fix a vulnerability that hackers were exploiting in the wild, meaning they were taking advantage of it to hack Apple devices.
On the security update page, Apple wrote that it “is aware of a report that this issue may have been actively exploited.” This is the language Apple uses when someone alerts the company that they have observed hackers exploiting a bug against targets in the real world, as opposed to a vulnerability found by a researcher in a controlled environment, so to speak.
In this case, Apple credited an anonymous researcher for the discovery, and also thanked Citizen Lab “for their assistance.” Citizen Lab is a digital rights research group housed at the University of Toronto’s Munk School, known for exposing the abuse of government hacking tools such as those made by NSO Group.
Apple’s spokesperson Scott Radcliffe told TechCrunch that the company has nothing to add apart from what’s in the release notes. Bill Marczak, a senior researcher at Citizen Lab, said that he and his colleagues have no comments for now.
This latest bug was in WebKit, Apple’s browser engine that’s used in Safari, and a historically popular target for hackers, since it can open up access to the rest of the device’s data.
In 2021, Motherboard reported that in just the first four months of that year, Apple had patched seven bugs exploited in the wild, of which six were in WebKit, a number that experts considered high at the time.
Since then, things have improved. According to TechCrunch’s count of vulnerabilities, since January 2022, there have been nine bugs in iOS that “may have been actively exploited,” of which four in WebKit. The others were three in the kernel, the core component of the operating system; one in AppleAVD, the company’s audio and video decoding framework; and one in IOMobileFrameBuffer, a kernel extension.
As usual, the chances that an average iPhone user will be targeted with a zero-day like this one are slim, but you should still update your phone.
A bug in a new centralized system that Meta created for users to manage their logins for Facebook and Instagram could have allowed malicious hackers to switch off an account’s two-factor protections just by knowing their phone number. Gtm Mänôz, a security researcher from Nepal, realized that Meta did not set up a limit of attempts when […]
ate on Friday, Twitter announced a new policy that will remove text message two-factor authentication (2FA) from any account that won’t pay for it. In a blog post, Twitter said that it will only allow accounts that subscribe to its premium Twitter Blue feature to use text message-based 2FA. Twitter users that don’t switch to a different […]
LastPass’ parent company GoTo — formerly LogMeIn — has confirmed that cybercriminals stole customers’ encrypted backups during a recent breach of its systems. The breach was first confirmed by LastPass on November 30. At the time, LastPass chief executive Karim Toubba said an “unauthorized party” had gained access to some customers’ information stored in a third-party cloud service shared […]
Leave a Reply