Global blockchain supervision and query platform

English
Download

Apple Acknowledges Security Vulnerability, Crypto Users at Risk

Apple Acknowledges Security Vulnerability, Crypto Users at Risk WikiBit 2024-11-22 16:01

Apple has acknowledged a security vulnerability that could allow hackers to take control of users’ iPhones or iPads if they visit malicious websites.

The company confirmed on Monday that its devices are affected by a flaw enabling remote execution of malicious code through web-based JavaScript. This vulnerability opens an attack vector that could lead to the theft of crypto-related data from unsuspecting users.

According to Apple‘s latest security disclosure, users must update their JavaScriptCore and WebKit software to the latest versions to patch the issue. Discovered by researchers at Google’s Threat Analysis Group, the vulnerability allows “processing maliciously crafted web content,” resulting in “cross-site scripting attacks.” Alarmingly, Apple also admitted that the issue “may have been actively exploited on Intel-based Mac systems.”

Apple issued a similar security disclosure for iPhone and iPad users, stating that the JavaScriptCore flaw enables the “processing of maliciously crafted web content, which may lead to arbitrary code execution.” In other words, hackers could potentially take control of users iPhones or iPads if they visit malicious sites. Apple assured users that updates should resolve the issue.

Jeremiah O‘Connor, CTO and co-founder of crypto cybersecurity firm Trugard, warned that “attackers could gain access to sensitive data like private keys or passwords stored in browsers,” potentially stealing crypto assets if users’ devices remain unpatched.

Earlier in March, reports emerged that security researchers had found vulnerabilities in Apples previous-generation chips (M1, M2, and M3 series). These flaws could allow hackers to extract cryptographic keys.

The vulnerability exploits a technique called “prefetching,” a feature in Apple‘s M-series chips designed to speed up interactions with the company’s devices. Prefetching can store sensitive data in the processors cache, enabling attackers to retrieve this information to reconstruct cryptographic keys that should remain inaccessible.

Unfortunately, according to Ars Technica, this presents a significant issue for Apple users, as chip-level vulnerabilities cannot be fixed through software updates.

Disclaimer:

The views in this article only represent the author's personal views, and do not constitute investment advice on this platform. This platform does not guarantee the accuracy, completeness and timeliness of the information in the article, and will not be liable for any loss caused by the use of or reliance on the information in the article.

  • Token conversion
  • Exchange rate conversion
  • Calculation for foreign exchange purchasing
/
PC(S)
Current Rate
Available

0.00