“Apple’s Passwords App Vulnerable to Phishing Attacks for Almost Three Months After Release”

"Apple's Passwords App Vulnerable to Phishing Attacks for Almost Three Months After Release"

“Apple’s Passwords App Vulnerable to Phishing Attacks for Almost Three Months After Release”


### Apple’s Passwords App Vulnerability: A Call to Action for Security

With the major update in **iOS 18**, Apple launched a new app named **Passwords**, which branched off from the Keychain password management feature. This initiative was intended to improve user ease in managing their credentials. Nevertheless, a recently revealed security breach has sparked significant worries regarding the app’s security, exposing users to phishing risks for almost three months, from the iOS 18 debut until the fix rolled out in iOS 18.2.

#### The Flaw Exposed

The flaw was first detected by security researchers from **Mysk**. Their analysis began upon noticing a concerning volume of insecure HTTP connections made by the Passwords app, as documented in their iPhone’s **App Privacy Report**. It was revealed that the app had reached approximately **130 different websites** via unencrypted HTTP connections, posing a considerable security threat, especially for a password management application.

The researchers found that the app was not only retrieving account logos and icons via HTTP but also typically opened password reset links using this unsecured protocol. This lapse allowed an attacker on the same network to intercept these HTTP communications and potentially misdirect users to phishing sites. Mysk stressed the seriousness of the matter, saying, “This left the user exposed.”

#### Mechanism of the Attack

The risk of phishing attacks occurs when users connect to unsecured networks, such as those in coffee shops, airports, or hotels. An attacker within the same network can capture the initial HTTP request prior to its redirection to a secure HTTPS version. By manipulating the data flow, attackers may redirect users to a counterfeit site that resembles genuine login pages, such as Microsoft’s live.com. Once users submit their credentials, attackers can seamlessly collect this confidential information and orchestrate additional attacks.

Mysk illustrated this vulnerability in a video, demonstrating how effortlessly an attacker could take advantage of the flaw. The ramifications of such an attack are dire, potentially resulting in unauthorized access to sensitive accounts and personal data.

#### Apple’s Action and the Necessity of HTTPS

Although the vulnerability was discreetly rectified in **December 2023**, Apple disclosed it only recently. The update to **iOS 18.2** guaranteed that the Passwords app now defaults to using HTTPS for all connections, thereby significantly bolstering security. Users are encouraged to verify that they are operating at least version 18.2 on their devices to defend against possible threats.

Mysk criticized Apple for failing to implement HTTPS by default in such a crucial application. They also recommended that Apple offer an option for security-minded users to turn off the downloading of icons entirely, as the continuous requests to various websites could introduce unnecessary hazards.

#### Conclusion

The identification of this vulnerability serves as an important reminder of the necessity for secure connections, particularly when handling sensitive data such as passwords. While Apple has made progress in addressing the issue, users need to stay alert and ensure they utilize the most current software updates to protect their information. As technology advances, so do the strategies employed by cybercriminals, underscoring the need for both companies and users to focus on security in their digital engagements.

For those worried about their online security, it’s wise to regularly check for updates, use strong and unique passwords, and exercise caution when accessing sensitive information on public networks. Being aware and taking proactive steps are crucial in navigating the constantly changing landscape of cybersecurity threats.