• bitcoinBitcoin (BTC) $ 42,977.00 0.18%
  • ethereumEthereum (ETH) $ 2,365.53 1.12%
  • tetherTether (USDT) $ 1.00 0.2%
  • bnbBNB (BNB) $ 302.66 0.19%
  • solanaSolana (SOL) $ 95.44 1.28%
  • xrpXRP (XRP) $ 0.501444 0.1%
  • usd-coinUSDC (USDC) $ 0.996294 0.34%
  • staked-etherLido Staked Ether (STETH) $ 2,367.26 1.4%
  • cardanoCardano (ADA) $ 0.481226 2.68%
  • avalanche-2Avalanche (AVAX) $ 34.37 1.19%
  • bitcoinBitcoin (BTC) $ 42,977.00 0.18%
    ethereumEthereum (ETH) $ 2,365.53 1.12%
    tetherTether (USDT) $ 1.00 0.2%
    bnbBNB (BNB) $ 302.66 0.19%
    solanaSolana (SOL) $ 95.44 1.28%
    xrpXRP (XRP) $ 0.501444 0.1%
    usd-coinUSDC (USDC) $ 0.996294 0.34%
    staked-etherLido Staked Ether (STETH) $ 2,367.26 1.4%
    cardanoCardano (ADA) $ 0.481226 2.68%
    avalanche-2Avalanche (AVAX) $ 34.37 1.19%
image-alt-1BTC Dominance: 58.93%
image-alt-2 ETH Dominance: 12.89%
image-alt-3 BTC/ETH Ratio: 26.62%
image-alt-4 Total Market Cap 24h: $2.51T
image-alt-5Volume 24h: $144.96B
image-alt-6 ETH Gas Price: 5.1 Gwei
 

MORE FROM SPONSORED

LIVE Web3 News

 

ARTICLE INFORMATION

Apple to fix dangerous bugs

Apple to fix dangerous bugs in iPhone and Mac raising risks for crypto users

Mariam Al-Yazidi

Key Points

  • Apple to fix dangerous bugs through urgent updates across iPhone and Mac devices

  • Crypto user funds face a higher risk from the latest zero-click exploit

  • Hackers can steal wallets and exchange credentials without user interaction

  • Experts urge manual updates and safer storage practices


Apple to fix dangerous bugs quickly became urgent after the company confirmed hackers were already exploiting them. The flaws targeted iPhone, Mac, and iPad devices through a zero-click attack. Crypto user accounts are at special risk since their wallets and apps often sit directly on these devices.

Apple labeled the flaw CVE-2025-43300. The attack needs no clicks, no links, and no user mistakes. A harmful image file sent over iMessage or email can grant attackers complete control. Once inside, hackers can monitor user behavior, steal exchange logins, and drain wallets without leaving a trace.

APPL

Crypto wallets under threat

For a crypto user, this bug poses unique dangers. Unlike bank theft, stolen cryptocurrency cannot be reversed. Once hackers move coins into their own wallets, the funds are lost forever. Experts highlight that crypto holders often have high-value balances, making them prime targets. Mobile storage adds to the exposure, since many users keep wallets or exchange apps on their daily-use iPhones or Mac systems.

The timing is poor for the digital asset industry. In the first half of 2025, CertiK reported over 2.2 billion dollars stolen from crypto investors. This context makes the Apple to fix dangerous bugs update a critical line of defense.

Apple system bugs exploited in the wild

This vulnerability hits Apple’s Image I/O framework, which manages photos across devices. Juliano Rizzo, CEO of Coinspect, explained that “an attachment delivered via iMessage can be processed automatically and lead to device compromise.” His statement reinforces the fact that no user interaction is required.

I would argue that many Apple fans underestimate the danger of system bugs. From my standpoint, this is a mistake. Hackers seek out valuable data, and crypto user balances are often too tempting to ignore.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) reacted by ordering federal agencies to update by September 11, 2025. That unusual step shows how seriously experts rate the problem.


ANOTHER MUST-READ ON ICN.LIVE: Pavel Durov’s arrest case and its lasting impact on Telegram and Web3

Which Apple devices are affected

The list includes nearly all modern Apple hardware:

  • iPhones from XS models onward

  • Recent iPad Pro, iPad Air, and iPad versions

  • Mac systems running macOS Sequoia, Sonoma, or Ventura

Apple has already released patches for iOS 18.6.2, iPadOS 18.6.2, and several Mac updates. Devices too old to receive these patches remain vulnerable. Experts suggest replacing them if used for crypto storage.

What crypto users should do

Security specialists provide urgent advice:

  • Update manually right now through device settings

  • Watch for suspicious behavior like unusual network traffic or wallet balance issues

  • Move funds to new wallets with fresh keys if compromise is suspected

  • Reset account passwords and secure backup methods

Based on my experience, hardware wallets remain the safest long-term choice. They remove most risks tied to system bugs on iPhones and Macs.


Historical parallels and future risks

Apple’s system bugs have been targeted before. In 2023, hackers abused the ImageIO framework to install Pegasus spyware through malicious images. That attack, called BLASTPASS, also required no user interaction.

Apple to fix dangerous bugs now highlights a repeating pattern. Sophisticated attackers exploit the same core media handling processes year after year. While Apple strengthens defenses, crypto users must stay alert and diversify storage methods.

Staying safe going forward

This incident shows that even careful people can fall victim. The zero-click nature means you don’t need to make mistakes. I don’t agree with those who claim “strong passwords are enough.” Hackers bypass passwords entirely once inside the system.

Crypto user safety depends on combining updates, hardware storage, and vigilance. Apple continues to fix system bugs, but individual responsibility matters most.

SHARE

Why are crypto users more at risk from Apple system bugs than others?

Crypto users are more at risk because cryptocurrency theft is permanent. Unlike banks, no authority can reverse a fraudulent transaction. Once stolen, coins move to hacker wallets beyond recovery. Hackers see crypto holders as prime targets due to the often high value stored directly on devices. Many investors also rely on mobile apps for convenience, which exposes their funds if the system itself is compromised. This makes immediate updates and hardware wallets especially critical.

What steps should a crypto user take immediately after hearing about this Apple bug?

First, update your device manually without waiting for automatic installation. Then check your wallet balances against your records. If anything looks wrong, generate new wallets on a clean device and move your funds. Also, change exchange and email passwords since hackers often use them to reset crypto logins. Finally, secure cloud accounts tied to crypto recovery phrases. These steps reduce the risk of permanent loss if your iPhone or Mac was compromised.

Which Apple devices remain vulnerable to this security bug?

Older Apple devices unable to run iOS 18.6.2, iPadOS 18.6.2, or the latest Mac updates remain exposed. This includes iPhones earlier than XS, certain old iPads, and Macs stuck on outdated operating systems. These devices cannot receive the fix Apple issued. Experts strongly advise against storing crypto on unsupported hardware. In practice, such devices should be retired or used only for non-sensitive tasks. Using them for crypto storage is unsafe.

How does this exploit compare to past Apple system bugs like Pegasus or BLASTPASS?

This exploit is similar to previous zero-click flaws that allowed Pegasus spyware to infect iPhones in 2023. Both involved Apple’s Image I/O framework, which processes picture files across devices. Attackers exploited this component to bypass user action and compromise devices silently. The pattern shows that image-handling code remains a favored entry point for sophisticated attackers. While Apple strengthened defenses, the recurrence suggests attackers will keep probing the same areas. For crypto users, the risk is magnified since direct access to wallets means instant theft.

FEATURED

EVENTS

Days
Hr
Min
Sec
 

ICN TALKS EPISODES