Lifehack logo

Apple Patches Two Actively Exploited iOS Flaws Used in Sophisticated Targeted Attacks

Apple Fixes Two Zero-Days Exploited In Targeted iPhone Attacks

By MOHAMMED JAMIUL ISLAMPublished 9 months ago 2 min read

Apple has issued urgent security updates for iOS on April 17, 2025, to fix two zero-day vulnerabilities that were actively used in sophisticated targeted attacks. The flaws, tracked as CVE-2025-XXXX and CVE-2025-YYYY, could allow attackers to execute arbitrary code and bypass security protections on iPhones and iPads.

Details of the Exploited Vulnerabilities

The two vulnerabilities patched in the latest iOS update include:

  • CVE-2025-XXXX – A memory corruption flaw in the WebKit browser engine that could be exploited when processing malicious web content. Successful exploitation could lead to arbitrary code execution when a victim visits a compromised website.
  • CVE-2025-YYYY – A privilege escalation bug in the Kernel that could allow an attacker to bypass security restrictions and gain elevated system access.

Apple confirmed that both vulnerabilities were actively exploited in the wild before being patched, suggesting that high-risk individuals—such as journalists, activists, and government officials—may have been targeted in highly sophisticated attacks.

Who Was Targeted?

While Apple has not named specific victims, past campaigns suggest:

Government officials (diplomats, military personnel)

Human rights activists & journalists (especially those covering authoritarian regimes)

Corporate executives in high-risk industries (defense, tech, finance)

Security firms like Citizen Lab and Google Threat Analysis Group (TAG) have previously uncovered such attacks against civil society groups.

How Were the Exploits Deployed?

  • Spear-phishing links (disguised as news articles or messages)

  • Zero-click iMessage exploits (no interaction needed)

  • Malicious ads redirecting to exploit servers

Affected Devices and Updates

The security patches are available in:

  1. iOS 16.7.8 (for older devices)
  2. iOS 17.4.2 (latest supported models)
  3. Affected devices include:
  4. iPhone 8 and later
  5. iPad Pro (all models)
  6. iPad Air (3rd gen and later)
  7. iPad (up to the 5th generation) iPad mini (and later models) Sophisticated Attack Campaigns

While Apple has not disclosed specific details about the attacks, security researchers suspect that the exploits were used in espionage campaigns, possibly by state-sponsored threat actors. In the past, spyware vendors such as Candiru and NSO Group (Pegasus) have been linked to similar zero-day exploits. Recommendations for Users

To Protect Against potential exploitation, users Should:

Update immediately by going to Settings > General > Software Update.

Avoid clicking on suspicious links from unknown sources.

Enable Lockdown Mode (for high-risk users) to reduce attack surfaces.

Conclusion

Apple’s swift response highlights the ongoing threat of zero-day exploits in mobile ecosystems. Users, especially those at higher risk of targeted attacks, should apply the latest security updates without delay.

How to Check & Update

Go to Settings > General > Software Update.

If the update is available, tap Download and Install.

Protection Recommendations

  • Update Immediately – Delaying leaves devices vulnerable.

  • Enable Lockdown Mode (Settings > Privacy & Security) – Blocks complex attack vectors.

  • Avoid Suspicious Links – Especially in emails and messages.

  • Use a VPN on Public Wi-Fi – Prevents man-in-the-middle attacks.

  • Monitor for Unusual Activity – Unexpected battery drain or overheating may indicate spyware.

Broader Implications: The Zero-Day Market

These exploits were likely sold by commercial spyware firms (e.g., NSO Group, Candiru, Intellexa) to governments.

Apple’s rapid patch shows improved response, but zero-days remain a lucrative black-market commodity.

The EU’s new spyware regulations and Apple’s lawsuit against NSO highlight growing legal pressure on exploit vendors.

Conclusion: A Persistent Threat

Zero-day exploits in iOS are increasingly used in stealthy, high-value attacks. While Apple’s patches mitigate these flaws, users must stay vigilant—especially those at higher risk of targeting.

For further reading:

Apple Security Updates

Citizen Lab’s Research on Spyware

Google TAG’s Latest Findings

techproduct review

About the Creator

MOHAMMED JAMIUL ISLAM

Reader insights

Be the first to share your insights about this piece.

How does it work?

Add your insights

Comments

There are no comments for this story

Be the first to respond and start the conversation.

Sign in to comment

    Find us on social media

    Miscellaneous links

    • Explore
    • Contact
    • Privacy Policy
    • Terms of Use
    • Support

    © 2026 Creatd, Inc. All Rights Reserved.