Markets

Apple is rushing out a software patch to fix an encryption vulnerability

Apple has released an urgent software update for iOS and macOS users after discovering a vulnerability that could target cryptocurrency holders.

according to kaspersky, Apple released urgent updates due to vulnerabilities in iOS and macOS devices. The security company urges Apple users to update devices to iOS 16.4.1 and macOS 13.3.1.

Due to the weak security, bad actors can “do almost anything,” even steal cryptocurrency from their target machines.

How vulnerable are Apple devices to encryption hacks?

Apple has identified two security threats, CVE-2023-28205 And CVE-2023-28206, a combination of which can allow exploiters to perform no-click exploits. This is an attack in which victims are taken to phishing websites, and malware is automatically installed inside their device without interacting with the page.

After installing the malware, attackers can take control of the device and run code without the need for basic permissions of the operating system. They can even access cryptocurrency wallets on users’ devices.

Cryptocurrency phishing attacks on the rise

Phishing attacks have gradually become the preferred mode for cryptocurrency hackers to steal user funds. According to a Kaspersky report, cryptocurrency phishing I slept By 40%, from 3,596,437 in 2021 to 5,040,520 discoveries in 2022.

In general, phishing websites vary slightly in spelling, which is difficult to spot for unaware users. They trick victims into linking wallets and then draining assets, including cryptocurrency tokens and non-fungible tokens (NFTs).

Some bad actors also run Google ads to display their phishing sites at the top of the search page. BeInCrypto reports that Google displayed a fake CoinMarketCap link on top of the original site in October.

Source: BeInCrypto article

Moreover, according to a survey of 2,000 Americans, a third of respondents have been victims of cryptocurrency theft.

Hence, users must take security measures such as diversifying funds in different wallets and storing private keys securely. Furthermore, users must thoroughly evaluate credibility before clicking on a link.

Do you have something to say about the vulnerability of Apple hardware or something else? Write to us or join the discussion on our website Telegram channel. You can also catch up with us Tik TokAnd Facebookor Twitter.

Get the latest version of BeInCrypto bitcoin (BTC) analysis, click here.

Disclaimer

Adhering to the Trust Project’s guidelines, BeInCrypto is committed to providing unbiased and transparent reporting. This news article aims to provide accurate and timely information. However, readers are advised to independently check the facts and consult with a professional before making any decisions based on this content.

Leave a Reply

Your email address will not be published. Required fields are marked *