{"id":48067,"date":"2022-08-19T15:23:34","date_gmt":"2022-08-19T15:23:34","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/33754\/Apple-Security-Flaw-Actively-Exploited-By-Hackers-To-Fully-Control-Devices.html"},"modified":"2022-08-19T15:23:34","modified_gmt":"2022-08-19T15:23:34","slug":"apple-security-flaw-actively-exploited-by-hackers-to-fully-control-devices","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/apple-security-flaw-actively-exploited-by-hackers-to-fully-control-devices\/","title":{"rendered":"Apple Security Flaw Actively Exploited By Hackers To Fully Control Devices"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/i.guim.co.uk\/img\/media\/b68929a5949e97740fd2a87f13c16f43e62ee71c\/0_159_1960_1176\/master\/1960.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=84d0e2900543e123c36957197837ea20\" class=\"ff-og-image-inserted\"><\/div>\n<p class=\"dcr-xry7m2\">Apple users have been advised to immediately update their iPhones, iPads and Macs to protect against a pair of security vulnerabilities that can allow attackers to take complete control of their devices.<\/p>\n<p class=\"dcr-xry7m2\">In both cases, Apple said, there are credible reports that hackers are already abusing the vulnerabilities to attack users.<\/p>\n<figure data-spacefinder-role=\"inline\" data-spacefinder-type=\"model.dotcomrendering.pageElements.NewsletterSignupBlockElement\" class=\" dcr-10khgmf\" readability=\"0.88075880758808\">\n<aside class=\"dcr-z79tmx\" readability=\"1.7615176151762\">\n<div class=\"dcr-1liyo6f\">\n<p class=\"dcr-tako4y\">Sign up to <span>TechScape<\/span><\/p>\n<div class=\"dcr-8ec1s8\">\n<div class=\"dcr-s5xdrg\"><span class=\"dcr-6jds8h\">Free weekly newsletter<\/span><\/div>\n<\/div>\n<\/div>\n<p class=\"dcr-13vfsep\">Alex Hern&#8217;s weekly dive in to how technology is shaping our lives<\/p>\n<p><gu-island name=\"SecureSignupIframe\" deferuntil=\"idle\" props=\"{&quot;html&quot;:&quot;\n\n<form id=\\&quot;secure-signup-tech-scape\\&quot;><label class=\\&quot;email-signup-iframe-1ycc62e\\&quot;><\/p>\n<div class=\\&quot;email-signup-iframe-13ehzns\\&quot;>Enter your email address<!-- --> <\/div>\n<p><\/label><\/p>\n<div class=\\&quot;email-signup-iframe-1xb79hp\\&quot;>\n<div class=\\&quot;email-signup-iframe-6oul4p\\&quot;><label for=\\&quot;src-component-34492\\&quot; class=\\&quot;email-signup-iframe-0\\&quot;><\/p>\n<div class=\\&quot;email-signup-iframe-6k6yuu\\&quot;>Enter your email address<!-- --> <\/div>\n<p><\/label><input type=\\&quot;email\\&quot; id=\\&quot;src-component-34492\\&quot; aria-required=\\&quot;true\\&quot; aria-invalid=\\&quot;false\\&quot; aria-describedby=\\&quot;\\&quot; required=\\&quot;\\&quot; name=\\&quot;email\\&quot; class=\\&quot;email-signup-iframe-13qh2xt\\&quot;\/><\/div>\n<p><button type=\\&quot;submit\\&quot; aria-live=\\&quot;polite\\&quot; class=\\&quot;email-signup-iframe-w7f9dl\\&quot;>Sign up<\/button><\/div>\n<\/form>\n<p>&quot;,&quot;styles&quot;:&quot;<\/p>\n<style data-emotion=\\&quot;email-signup-iframe-global 0\\&quot;><\/style>\n<style data-emotion=\\&quot;email-signup-iframe 1ycc62e 13ehzns 1xb79hp 6oul4p 6k6yuu 13qh2xt w7f9dl\\&quot;>.email-signup-iframe-1ycc62e div{font-family:GuardianTextSans,Guardian Text Sans Web,Helvetica Neue,Helvetica,Arial,Lucida Grande,sans-serif;font-size:0.875rem;line-height:1.5;font-weight:700;}.email-signup-iframe-13ehzns{font-family:GuardianTextSans,Guardian Text Sans Web,Helvetica Neue,Helvetica,Arial,Lucida Grande,sans-serif;font-size:1.0625rem;line-height:1.35;font-weight:700;color:#121212;}.email-signup-iframe-1xb79hp{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-flex-direction:row;-ms-flex-direction:row;flex-direction:row;-webkit-align-items:flex-start;-webkit-box-align:flex-start;-ms-flex-align:flex-start;align-items:flex-start;-webkit-box-flex-wrap:wrap;-webkit-flex-wrap:wrap;-ms-flex-wrap:wrap;flex-wrap:wrap;}.email-signup-iframe-6oul4p{margin-right:12px;margin-bottom:8px;-webkit-flex-basis:335px;-ms-flex-preferred-size:335px;flex-basis:335px;-webkit-flex-shrink:1;-ms-flex-negative:1;flex-shrink:1;}.email-signup-iframe-6k6yuu{font-family:GuardianTextSans,Guardian Text Sans Web,Helvetica Neue,Helvetica,Arial,Lucida Grande,sans-serif;font-size:1.0625rem;line-height:1.35;font-weight:700;color:#121212;position:absolute;opacity:0;height:0;width:0;top:0;left:0;}.email-signup-iframe-13qh2xt{width:100%;box-sizing:border-box;height:44px;font-family:GuardianTextSans,Guardian Text Sans Web,Helvetica Neue,Helvetica,Arial,Lucida Grande,sans-serif;font-size:1.0625rem;line-height:1.35;font-weight:400;color:#121212;background-color:#FFFFFF;border:2px solid #999999;padding:0 8px;margin-top:4px;height:36px;margin-top:0;}.email-signup-iframe-13qh2xt:invalid{box-shadow:none;}.email-signup-iframe-13qh2xt:active{border:2px solid #007ABC;}.email-signup-iframe-13qh2xt:focus{outline:0;}html:not(.src-focus-disabled) .email-signup-iframe-13qh2xt:focus{box-shadow:0 0 0 5px #0093E0;}.email-signup-iframe-13qh2xt:invalid[value]:not([value='']){border:4px solid #C70000;color:#121212;margin-top:0;}.email-signup-iframe-13qh2xt:invalid[value]:not([value='']):active{border:4px solid #C70000;}.email-signup-iframe-w7f9dl{display:-webkit-inline-box;display:-webkit-inline-flex;display:-ms-inline-flexbox;display:inline-flex;-webkit-box-pack:justify;-webkit-justify-content:space-between;justify-content:space-between;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;box-sizing:border-box;border:none;background:transparent;cursor:pointer;-webkit-transition:.3s ease-in-out;transition:.3s ease-in-out;-webkit-text-decoration:none;text-decoration:none;white-space:nowrap;font-family:GuardianTextSans,Guardian Text Sans Web,Helvetica Neue,Helvetica,Arial,Lucida Grande,sans-serif;font-size:1.0625rem;line-height:1.5;font-weight:700;height:36px;min-height:36px;padding:0 16px;border-radius:36px;padding-bottom:2px;background-color:#052962;color:#FFFFFF;-webkit-box-pack:center;-ms-flex-pack:center;-webkit-justify-content:center;justify-content:center;background-color:#000000;-webkit-flex-basis:118px;-ms-flex-preferred-size:118px;flex-basis:118px;-webkit-flex-shrink:0;-ms-flex-negative:0;flex-shrink:0;margin-bottom:8px;}.email-signup-iframe-w7f9dl:disabled{cursor:not-allowed;}.email-signup-iframe-w7f9dl:focus{outline:0;}html:not(.src-focus-disabled) .email-signup-iframe-w7f9dl:focus{box-shadow:0 0 0 5px #0093E0;}.email-signup-iframe-w7f9dl:hover{background-color:#234B8A;}.email-signup-iframe-w7f9dl:hover{background-color:#333333;}<\/style>\n<p>&quot;,&quot;newsletterId&quot;:&quot;tech-scape&quot;,&quot;successDescription&quot;:&quot;We&#8217;ll send you TechScape every week&quot;}&#8221; clientonly=&#8221;true&#8221;><\/gu-island><\/p>\n<div class=\"dcr-164r41r\"><span class=\"dcr-raakwg\"><strong>Privacy Notice: <\/strong>Newsletters may contain info about charities, online ads, and content funded by outside parties. For more information see our<!-- --> <a data-ignore=\"global-link-styling\" href=\"https:\/\/www.theguardian.com\/help\/privacy-policy\" rel=\"noopener noreferrer\" class=\"dcr-156g37s\">Privacy Policy<\/a>. We use Google reCaptcha to protect our website and the Google<!-- --> <a data-ignore=\"global-link-styling\" href=\"https:\/\/policies.google.com\/privacy\" rel=\"noopener noreferrer\" class=\"dcr-156g37s\">Privacy Policy<\/a> and<!-- --> <a data-ignore=\"global-link-styling\" href=\"https:\/\/policies.google.com\/terms\" rel=\"noopener noreferrer\" class=\"dcr-156g37s\">Terms of Service<\/a> <!-- -->apply.<\/span><\/div>\n<\/aside>\n<\/figure>\n<figure id=\"0be73fb0-f483-477a-b789-c471fa0426bd\" data-spacefinder-role=\"richLink\" data-spacefinder-type=\"model.dotcomrendering.pageElements.RichLinkBlockElement\" class=\" dcr-1mfia18\"><gu-island name=\"RichLinkComponent\" deferuntil=\"idle\" props=\"{&quot;richLinkIndex&quot;:3,&quot;element&quot;:{&quot;_type&quot;:&quot;model.dotcomrendering.pageElements.RichLinkBlockElement&quot;,&quot;url&quot;:&quot;https:\/\/www.theguardian.com\/us-news\/2022\/aug\/18\/apple-airtag-airline-worker-stealing-luggage-florida&quot;,&quot;text&quot;:&quot;AirTag leads to arrest of Florida airline worker accused of stealing luggage&quot;,&quot;prefix&quot;:&quot;Related: &quot;,&quot;role&quot;:&quot;richLink&quot;,&quot;elementId&quot;:&quot;0be73fb0-f483-477a-b789-c471fa0426bd&quot;},&quot;ajaxUrl&quot;:&quot;https:\/\/api.nextgen.guardianapps.co.uk&quot;,&quot;format&quot;:{&quot;display&quot;:0,&quot;theme&quot;:0,&quot;design&quot;:0}}\"><\/gu-island><\/figure>\n<p class=\"dcr-xry7m2\">One of the software weaknesses affects the kernel, the deepest layer of the operating system that all the devices have in common, Apple said. The other affects WebKit, the underlying technology of the Safari web browser.<\/p>\n<p class=\"dcr-xry7m2\">For each of the bugs, the company said it was \u201caware of a report that this issue may have been actively exploited,\u201d though it provided no further details. It credited an anonymous researcher or researchers for disclosing both.<\/p>\n<p class=\"dcr-xry7m2\">Anyone with an iPhone released since 2015, an iPad released since 2014 or a Mac running macOS Monterey can download the update by opening up the settings menu on their mobile device, or choosing \u201csoftware update\u201d on the \u201cabout this Mac\u201d menu on their computer.<\/p>\n<p class=\"dcr-xry7m2\">Rachel Tobac, the CEO of SocialProof Security, said Apple\u2019s explanation of the vulnerability meant a hacker could get \u201cfull admin access to the device\u201d so that they can \u201cexecute any code as if they are you, the user\u201d.<\/p>\n<p class=\"dcr-xry7m2\">Those who should be particularly attentive to updating their software are \u201cpeople who are in the public eye\u201d, such as activists or journalists who might be the targets of sophisticated nation-state spying, Tobac said.<\/p>\n<p class=\"dcr-xry7m2\">Until the fix was released on Wednesday, the vulnerabilities will have been classed as \u201czero-day\u201d bugs, because there has been a fix available for them for zero days. Such weaknesses are hugely valuable on the open market, where cyberweapon brokers will buy them for hundreds of thousands, or millions, of dollars.<\/p>\n<p class=\"dcr-xry7m2\">The broker Zerodium, for instance, will pay \u201cup to $500,000\u201d for a security weakness that can be used to hack a user through Safari, and up to $2m for a fully developed piece of malware that can hack an iPhone without a user needing to click on anything. The company says its customers for such weaknesses are \u201cgovernment institutions (mainly from Europe and North America)\u201d.<\/p>\n<p class=\"dcr-xry7m2\">Commercial spyware companies such as Israel\u2019s NSO Group are known for identifying and taking advantage of such flaws, exploiting them in malware that surreptitiously infects targets\u2019 smartphones, siphons their contents and surveils the targets in real time.<\/p>\n<p class=\"dcr-xry7m2\">NSO Group has been blacklisted by the US commerce department. Its spyware is known to have been used in Europe, the Middle East, Africa and Latin America against journalists, dissidents and human rights activists.<\/p>\n<p class=\"dcr-xry7m2\">Will Strafach, a security researcher, said he had seen no technical analysis of the vulnerabilities that Apple has just patched. The company has previously acknowledged similarly serious flaws and, on what Strafach estimated to be perhaps a dozen occasions, has noted that it was aware of reports that such security holes had been exploited.<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/33754\/Apple-Security-Flaw-Actively-Exploited-By-Hackers-To-Fully-Control-Devices.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[7581],"class_list":["post-48067","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-blogs","tag-headlinehackerphoneflawpatchapple"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Apple Security Flaw Actively Exploited By Hackers To Fully Control Devices 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/apple-security-flaw-actively-exploited-by-hackers-to-fully-control-devices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple Security Flaw Actively Exploited By Hackers To Fully Control Devices 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/apple-security-flaw-actively-exploited-by-hackers-to-fully-control-devices\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-19T15:23:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i.guim.co.uk\/img\/media\/b68929a5949e97740fd2a87f13c16f43e62ee71c\/0_159_1960_1176\/master\/1960.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=84d0e2900543e123c36957197837ea20\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/apple-security-flaw-actively-exploited-by-hackers-to-fully-control-devices\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/apple-security-flaw-actively-exploited-by-hackers-to-fully-control-devices\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Apple Security Flaw Actively Exploited By Hackers To Fully Control Devices\",\"datePublished\":\"2022-08-19T15:23:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/apple-security-flaw-actively-exploited-by-hackers-to-fully-control-devices\/\"},\"wordCount\":82,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/apple-security-flaw-actively-exploited-by-hackers-to-fully-control-devices\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i.guim.co.uk\/img\/media\/b68929a5949e97740fd2a87f13c16f43e62ee71c\/0_159_1960_1176\/master\/1960.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=84d0e2900543e123c36957197837ea20\",\"keywords\":[\"headline,hacker,phone,flaw,patch,apple\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/apple-security-flaw-actively-exploited-by-hackers-to-fully-control-devices\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/apple-security-flaw-actively-exploited-by-hackers-to-fully-control-devices\/\",\"name\":\"Apple Security Flaw Actively Exploited By Hackers To Fully Control Devices 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/apple-security-flaw-actively-exploited-by-hackers-to-fully-control-devices\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/apple-security-flaw-actively-exploited-by-hackers-to-fully-control-devices\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i.guim.co.uk\/img\/media\/b68929a5949e97740fd2a87f13c16f43e62ee71c\/0_159_1960_1176\/master\/1960.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=84d0e2900543e123c36957197837ea20\",\"datePublished\":\"2022-08-19T15:23:34+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/apple-security-flaw-actively-exploited-by-hackers-to-fully-control-devices\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/apple-security-flaw-actively-exploited-by-hackers-to-fully-control-devices\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/apple-security-flaw-actively-exploited-by-hackers-to-fully-control-devices\/#primaryimage\",\"url\":\"https:\/\/i.guim.co.uk\/img\/media\/b68929a5949e97740fd2a87f13c16f43e62ee71c\/0_159_1960_1176\/master\/1960.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=84d0e2900543e123c36957197837ea20\",\"contentUrl\":\"https:\/\/i.guim.co.uk\/img\/media\/b68929a5949e97740fd2a87f13c16f43e62ee71c\/0_159_1960_1176\/master\/1960.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=84d0e2900543e123c36957197837ea20\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/apple-security-flaw-actively-exploited-by-hackers-to-fully-control-devices\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,phone,flaw,patch,apple\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerphoneflawpatchapple\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Apple Security Flaw Actively Exploited By Hackers To Fully Control Devices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Apple Security Flaw Actively Exploited By Hackers To Fully Control Devices 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/apple-security-flaw-actively-exploited-by-hackers-to-fully-control-devices\/","og_locale":"en_US","og_type":"article","og_title":"Apple Security Flaw Actively Exploited By Hackers To Fully Control Devices 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/apple-security-flaw-actively-exploited-by-hackers-to-fully-control-devices\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-08-19T15:23:34+00:00","og_image":[{"url":"https:\/\/i.guim.co.uk\/img\/media\/b68929a5949e97740fd2a87f13c16f43e62ee71c\/0_159_1960_1176\/master\/1960.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=84d0e2900543e123c36957197837ea20","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/apple-security-flaw-actively-exploited-by-hackers-to-fully-control-devices\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-security-flaw-actively-exploited-by-hackers-to-fully-control-devices\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Apple Security Flaw Actively Exploited By Hackers To Fully Control Devices","datePublished":"2022-08-19T15:23:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-security-flaw-actively-exploited-by-hackers-to-fully-control-devices\/"},"wordCount":82,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-security-flaw-actively-exploited-by-hackers-to-fully-control-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/i.guim.co.uk\/img\/media\/b68929a5949e97740fd2a87f13c16f43e62ee71c\/0_159_1960_1176\/master\/1960.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=84d0e2900543e123c36957197837ea20","keywords":["headline,hacker,phone,flaw,patch,apple"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/apple-security-flaw-actively-exploited-by-hackers-to-fully-control-devices\/","url":"https:\/\/www.threatshub.org\/blog\/apple-security-flaw-actively-exploited-by-hackers-to-fully-control-devices\/","name":"Apple Security Flaw Actively Exploited By Hackers To Fully Control Devices 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-security-flaw-actively-exploited-by-hackers-to-fully-control-devices\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-security-flaw-actively-exploited-by-hackers-to-fully-control-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/i.guim.co.uk\/img\/media\/b68929a5949e97740fd2a87f13c16f43e62ee71c\/0_159_1960_1176\/master\/1960.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=84d0e2900543e123c36957197837ea20","datePublished":"2022-08-19T15:23:34+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-security-flaw-actively-exploited-by-hackers-to-fully-control-devices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/apple-security-flaw-actively-exploited-by-hackers-to-fully-control-devices\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/apple-security-flaw-actively-exploited-by-hackers-to-fully-control-devices\/#primaryimage","url":"https:\/\/i.guim.co.uk\/img\/media\/b68929a5949e97740fd2a87f13c16f43e62ee71c\/0_159_1960_1176\/master\/1960.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=84d0e2900543e123c36957197837ea20","contentUrl":"https:\/\/i.guim.co.uk\/img\/media\/b68929a5949e97740fd2a87f13c16f43e62ee71c\/0_159_1960_1176\/master\/1960.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=84d0e2900543e123c36957197837ea20"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/apple-security-flaw-actively-exploited-by-hackers-to-fully-control-devices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,phone,flaw,patch,apple","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerphoneflawpatchapple\/"},{"@type":"ListItem","position":3,"name":"Apple Security Flaw Actively Exploited By Hackers To Fully Control Devices"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48067","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=48067"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48067\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=48067"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=48067"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=48067"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}