Summary: Apple patches iOS zero-day that put crypto wallets at risk via malicious images

Published: 22 days and 3 hours ago
Based on article from CryptoSlate

Apple has issued urgent software updates to address a critical zero-day vulnerability. This flaw posed a significant threat to users, particularly those managing cryptocurrency on their mobile devices. The exploit could silently compromise devices and put digital assets at grave risk.

The Exploited Vulnerability

Apple’s recent security patches, including iOS 18.6.2 and iPadOS 18.6.2, fix a dangerous zero-day exploit. The vulnerability, tracked as CVE-2025-43300, resided in the ImageIO framework. This component is responsible for parsing common image formats. It allowed for memory corruption and arbitrary code execution through a specially crafted malicious image. Crucially, this flaw was actively exploited in sophisticated attacks targeting specific individuals. The ease of delivering malicious images via messaging apps or web content made it particularly insidious.

Grave Risks for Crypto Holders

The exploit presented a direct and alarming threat to cryptocurrency users. A compromised image could silently hijack a user's clipboard. This allows attackers to swap recipient addresses during on-chain transactions, redirecting funds. Furthermore, it enabled the silent harvesting of sensitive information like seed phrases. Many users store these critical recovery phrases in screenshots or photo libraries for convenience. Sophisticated mobile spyware uses optical character recognition (OCR) to scan galleries for such phrases. This zero-day thus provided an initial foothold. It facilitated broader surveillance of crypto activity and direct theft of digital assets.

Immediate Action and Enhanced Security

Given the severity, users are strongly urged to update their Apple devices immediately. This includes iOS/iPadOS 18.6.2 and the corresponding macOS versions. Beyond updating, crypto users should adopt additional security practices. It is critical to move seed phrase storage away from photo libraries. Reviewing app photo permissions is also advised. Limiting clipboard access for applications can mitigate hijacking risks. Treating mobile wallets as "hot environments" with strict hygiene is paramount. These measures collectively reduce the "post-exploit blast radius" and enhance overall digital asset security.

Cookies Policy - Privacy Policy - Terms of Use - © 2025 Altfins, j. s. a.