{"id":77420,"date":"2023-04-18T15:34:52","date_gmt":"2023-04-18T12:34:52","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=77420"},"modified":"2025-09-10T23:13:55","modified_gmt":"2025-09-10T20:13:55","slug":"flaws-in-ios-and-macos-threaten-users-crypto-assets","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/flaws-in-ios-and-macos-threaten-users-crypto-assets\/","title":{"rendered":"Flaws in iOS and macOS threaten users\u2019 crypto assets"},"content":{"rendered":"<p>Two critical vulnerabilities have been found in Apple&#8217;s operating systems, enabling attackers to obtain superuser privileges on the victim&#8217;s device. <a href=\\\"https:\/\/www.kaspersky.com\/blog\/ios-macos-vulnerabilities-april-2023\/47938\/\\\">reported<\/a> by Kaspersky Lab experts.<\/p>\n<p>\\n\\n\\n\\n<\/p>\n<p>The first exploit is in the WebKit browser engine, which is used to render web pages.<\/p>\n<p>\\n\\n\\n\\n<\/p>\n<blockquote class=\\\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\\\">\n<p>&#8220;This makes it possible to compromise an iPhone, iPad or Mac without any action on the part of the user \u2014 you simply need to lure them to a specially crafted malicious site,&#8221; the specialists noted.<\/p>\n<\/blockquote>\n<p>\\n\\n\\n\\n<\/p>\n<p>Using the second vulnerability in the IOSurfaceAccelerator object, attackers execute code with kernel privileges, gaining full control over the device.<\/p>\n<p>\\n\\n\\n\\n<\/p>\n<p>Journalist Colin Wu noted that this potentially threatens the security of users&#8217; crypto assets.<\/p>\n<p>\\n\\n\\n\\n<\/p>\n<blockquote class=\\\"twitter-tweet\\\">\n<p lang=\\\"en\\\" dir=\\\"ltr\\\">A very serious vulnerability has been found again in Apple&#8217;s operating system. Attackers can gain root privileges, which may compromise the security of users&#8217; crypto assets. Requires updating to iOS 16.4.1 and macOS 13.3.1. H\/T <a href=\\\"https:\/\/twitter.com\/IM_23pds?ref_src=twsrc%5Etfw\\\">@IM_23pds<\/a> <a href=\\\"https:\/\/t.co\/n5zSSt0sWD\\\">https:\/\/t.co\/n5zSSt0sWD<\/a><\/p>\n<p>\u2014 Wu Blockchain (@WuBlockchain) <a href=\\\"https:\/\/twitter.com\/WuBlockchain\/status\/1648267816796295169?ref_src=twsrc%5Etfw\\\">April 18, 2023<\/a><\/p><\/blockquote>\n<p> <script async src=\\\"https:\/\/platform.twitter.com\/widgets.js\\\" charset=\\\"utf-8\\\"><\/script>\\n\\n\\n\\n<\/p>\n<p>To address the vulnerabilities, Apple has already issued updates not only for the latest operating systems but also for several earlier versions.<\/p>\n<p>\\n\\n\\n\\n<\/p>\n<p>Kaspersky Lab researchers suggested that the exploits are actively being used by unknown attackers to install spyware.<\/p>\n<p>\\n\\n\\n\\n<\/p>\n<p>Earlier in March, it was reported that malicious versions of certain macOS programs were <a href=\"https:\/\/forklog.com\/en\/news\/gadget-reboot-triggered-by-youtube-clip-trezor-phishing-attack-and-other-cybersecurity-news\">infected with a hidden Monero miner<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Two critical vulnerabilities in Apple operating systems allow attackers to obtain superuser privileges on the victim&#8217;s device.<\/p>\n","protected":false},"author":1,"featured_media":77421,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1112,1301,1553],"class_list":["post-77420","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-apple","tag-blockchain-vulnerabilities","tag-kaspersky-lab"],"aioseo_notices":[],"amp_enabled":true,"views":"18","promo_type":"1","layout_type":"1","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/77420","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=77420"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/77420\/revisions"}],"predecessor-version":[{"id":77422,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/77420\/revisions\/77422"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/77421"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=77420"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=77420"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=77420"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}