Urgent Security Update Released for iOS and macOS Devices
Apple has issued critical security patches to fix a zero-click vulnerability that allowed attackers to compromise iPhones, iPads, and Macs without user interaction — posing a serious threat to cryptocurrency holders.
The flaw was discovered in Apple’s Image I/O framework, which processes image files. According to Apple’s security advisory, the vulnerability allowed out-of-bounds memory writing, enabling attackers to execute malicious code remotely by sending specially crafted images.
The issue has been resolved in the latest updates:
- macOS Sonoma 14.7.8 and Ventura 13.7.8
- macOS Sequoia 15.6.1
- iOS 18.6.2 and iPadOS 18.6.2
“Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals,” the company stated.
Why Crypto Users Are at Higher Risk
Cybersecurity experts warn that this type of vulnerability poses a severe risk to individuals managing digital assets, as attackers who gain device-level access can steal wallet keys or intercept signing operations.
Juliano Rizzo, CEO of security firm Coinspect, explained:
“This is a zero-click vulnerability that does not require user interaction. An attachment delivered via iMessage can be processed automatically and lead to device compromise. Attackers could leverage this access to reach wallet data.”
How the Exploit Works
The Image I/O flaw allowed attackers to write to unauthorized memory regions, enabling arbitrary code execution. In simple terms, malicious actors could inject and run their own code, taking full control of the device.
What Should Users Do?
Apple strongly recommends immediate updates to prevent exploitation. For crypto holders, experts advise extra caution:
- Regenerate wallet keys if there’s any sign of compromise.
- Secure primary accounts such as email and cloud storage.
- Avoid delays: “Patching is critical, but never wait for updates to finish before locking down accounts,” said Rizzo.
For regular users, signs of compromise are hard to detect, but Apple and security vendors may contact affected individuals if targeted attacks are confirmed.
Disclaimer
This content is for informational purposes only and does not constitute financial, investment, or legal advice. Cryptocurrency trading involves risk and may result in financial loss.

