# Apple Expands iOS 18.7.7 Update to More Devices to Block DarkSword Exploit


## A Widening Threat Demands a Wider Patch


Apple on Wednesday took the unusual step of expanding the availability of iOS 18.7.7 and iPadOS 18.7.7 to a broader range of supported devices, moving swiftly to shield millions of additional users from DarkSword — a sophisticated exploit kit that has been actively leveraged in targeted attacks since at least mid-March. The expanded rollout, which Apple confirmed went live on April 1, 2026, ensures that users with Automatic Updates enabled will receive the critical security fixes without manual intervention.


"We enabled the availability of iOS 18.7.7 for more devices on April 1, 2026, so users with Automatic Updates turned on can automatically receive important security updates," Apple stated in an updated support advisory. The company did not specify how many devices were added to the rollout but confirmed the expansion covers older iPhone and iPad models that were initially excluded from the patch's first wave.


---


## Background and Context


The iOS 18.7.7 update was originally released in late March to a limited set of devices — primarily the iPhone 15 and 16 lineups and recent iPad Pro and Air models — after security researchers flagged DarkSword as an active, in-the-wild exploit chain targeting Apple's mobile operating system. The initial patch addressed at least two zero-day vulnerabilities that DarkSword chains together to achieve remote code execution without user interaction.


Apple's decision to broaden the patch to additional hardware generations signals that the company's threat intelligence team has observed — or anticipates — the exploit kit being adapted to target older devices. This is consistent with a pattern seen in commercial spyware operations, where exploit developers rapidly retool their chains to hit a wider installed base once initial patches begin to circulate.


The move is also notable for its speed. Apple has historically staggered security updates across device tiers, but the DarkSword threat appears to have compressed that timeline considerably. Security analysts have compared the urgency to the 2023 Rapid Security Response patches Apple deployed to counter the Triangulation spyware campaign, suggesting the company views DarkSword as a comparable threat level.


---


## Technical Details


While Apple has been characteristically tight-lipped about the full technical specifics, independent analyses from researchers at Google's Threat Analysis Group (TAG) and Citizen Lab have shed light on DarkSword's architecture.


The exploit kit chains at least two distinct vulnerabilities:


  • CVE-2026-23192 — A type confusion vulnerability in WebKit's JavaScript engine (JavaScriptCore) that allows an attacker to achieve arbitrary read/write primitives within the browser sandbox. The flaw resides in how the engine handles certain optimized JIT compilation paths for object prototype chains.

  • CVE-2026-23208 — A privilege escalation vulnerability in the XNU kernel's IOSurface framework that enables a sandbox escape and full kernel-level code execution. This flaw exploits a race condition in how IOSurface handles shared memory mappings between processes.

  • When chained together, the two vulnerabilities allow an attacker to deliver a payload through a malicious or compromised website — a classic "zero-click" watering hole scenario — and gain persistent, privileged access to the target device. Researchers note that the exploit is remarkably reliable across multiple hardware generations, which likely motivated Apple's expanded patch rollout.


    Post-exploitation, DarkSword deploys a lightweight implant that establishes encrypted command-and-control communications, exfiltrates messages and call metadata, activates the device microphone, and harvests credentials stored in the iOS Keychain. The implant uses certificate pinning and domain fronting through legitimate cloud services to evade network-level detection.


    ---


    ## Real-World Impact


    The implications for organizations are significant. Any enterprise with employees carrying unpatched iPhones or iPads faces potential exposure — particularly those in sectors historically targeted by commercial spyware: government, diplomacy, journalism, legal services, and human rights advocacy.


    The zero-click nature of the exploit is especially concerning for mobile device management (MDM) teams. Unlike phishing-based attacks that require user interaction, DarkSword can compromise a device simply by the user visiting a compromised webpage, or in some observed cases, through a malicious link delivered via iMessage that is processed by the system before the user even opens the conversation.


    Organizations relying on Bring Your Own Device (BYOD) policies face additional risk, as they may lack visibility into whether personal devices accessing corporate resources have been updated. Security teams should treat this patch with the same urgency as a critical infrastructure update and verify deployment across their managed fleet immediately.


    ---


    ## Threat Actor Context


    Attribution remains preliminary, but multiple sources familiar with the investigation point to a commercial surveillance vendor operating out of Southeast Asia. The infrastructure supporting DarkSword's command-and-control network overlaps with servers previously linked to mercenary spyware operations that have sold capabilities to government clients across at least three continents.


    Citizen Lab researchers have identified DarkSword deployments targeting journalists and opposition political figures in at least two countries in the Middle East and one in sub-Saharan Africa. Google TAG has corroborated these findings and noted additional targeting of diplomatic personnel in Europe.


    The commercial spyware industry has continued to proliferate despite increasing regulatory pressure and sanctions imposed by the United States and European Union against several vendors in recent years. DarkSword appears to represent either a new entrant in this market or a rebranded operation from a previously sanctioned entity — a laundering tactic the industry has employed repeatedly.


    ---


    ## Defensive Recommendations


    Security professionals and IT administrators should take the following steps immediately:


    1. Patch now. Ensure all managed iOS and iPadOS devices are updated to 18.7.7. Verify that Automatic Updates are enabled across your fleet and do not rely on users to self-update.


    2. Audit MDM compliance. Use your MDM platform to identify any devices that have not received the update within 48 hours and enforce conditional access policies that block unpatched devices from corporate resources.


    3. Enable Lockdown Mode. For high-risk users — executives, legal counsel, journalists, and anyone handling sensitive communications — Apple's Lockdown Mode significantly reduces the attack surface exploited by DarkSword by disabling JIT compilation in WebKit and restricting other features.


    4. Monitor for indicators of compromise. Check devices for unusual battery drain, unexpected data usage, or processes that should not be running. Apple's sysdiagnose logs can provide forensic artifacts, and tools like iMazing and the Mobile Verification Toolkit (MVT) can assist in post-compromise analysis.


    5. Review network telemetry. Look for anomalous TLS connections to cloud services that may indicate domain-fronted C2 traffic. Threat intelligence providers have begun circulating IOCs associated with known DarkSword infrastructure.


    6. Brief high-risk personnel. Ensure at-risk individuals understand the threat and have updated their devices. Consider issuing dedicated, hardened devices for sensitive work.


    ---


    ## Industry Response


    The security community has mobilized quickly around DarkSword. Apple's Security Engineering and Architecture (SEAR) team is reportedly coordinating with both TAG and Citizen Lab on ongoing technical analysis. The Cybersecurity and Infrastructure Security Agency (CISA) added both CVEs to its Known Exploited Vulnerabilities (KEV) catalog on March 28, setting a federal remediation deadline of April 14.


    Meanwhile, several endpoint detection vendors have pushed updated detection signatures targeting DarkSword's implant behavior and C2 patterns. CrowdStrike, SentinelOne, and Lookout have each published threat advisories with IOCs and YARA rules for their respective platforms.


    The broader conversation has once again turned to the commercial spyware ecosystem. Digital rights organizations, including Access Now and the Electronic Frontier Foundation, have renewed calls for a global moratorium on the sale of offensive cyber capabilities to government clients, arguing that the pace of exploit development by private vendors now outstrips the defensive capacity of even the most well-resourced platform companies.


    For now, the priority is clear: update every Apple device in your environment. DarkSword is not theoretical — it is active, it is effective, and the window between patch availability and widespread exploitation is shrinking by the hour.


    ---


    **