iOS 18 Users at Risk of Phishing Due to Massive Passwords Vulnerability

20 March 2025 1 minute Author: Newsman

Apple has disclosed a critical vulnerability in the Passwords app that exposed iOS 18 users to phishing attacks for three months. The flaw was fixed with the release of iOS 18.2.

Cybersecurity experts discovered that Passwords was sending requests for logos and icons of websites for which passwords were saved in unencrypted form. This opened up opportunities for attackers who were on the same Wi-Fi network as the user (say, in public places) to replace these images. As a result, the user was redirected to fake, phishing sites where their credentials could be compromised.

The vulnerability existed since the release of iOS 18, and the problem was reported to Apple back in September 2024. After analysis and testing, the fix was only released in iOS 18.2, which resolved the issue by encrypting all requests.

Phishing attacks are becoming increasingly sophisticated, and even official apps are not immune to critical flaws. Apple strongly recommends that all users update their devices to iOS 18.2 to minimize the likelihood of potential threats.

Other related articles
News
Read more
Over 900,000 Accounts at Risk in Collectibles.com Data Leak
Collectibles.com data leak: over 900,000 users at risk due to open Elasticsearch server. The database contains names, transaction data, email addresses, which can lead to fraud and theft of personal information. How to protect your account? Experts advise: change passwords, activate 2FA, and be careful with suspicious messages.
136
News
Read more
Ukraine Prepares Drone Swarms for the Front
Swarms of drones in Ukraine can turn the tide of hostilities. Engineers are developing drones with autonomous navigation and electronic warfare bypass systems. Ukraine is preparing for the mass use of FPV drones, and new technologies provide rapid training of operators. Will this be a turning point in the military sphere?
138
Found an error?
If you find an error, take a screenshot and send it to the bot.