Apple is telling people who still have an old version of iOS to update their iPhones to protect themselves from web-based attacks that use powerful exploit kits like Coruna and DarkSword This article explores version ios update. . These attacks use bad web content to target old versions of iOS, which starts an infection chain that ends with the theft of private information.

Apple said in a support document, "If you click on a bad link or go to a compromised website while using an older version of iOS, for example, your iPhone's data could be stolen."

"We looked into these problems in great detail as they came to light and quickly released software updates for the most recent versions of the operating system to fix security holes and stop such attacks." If you already have the most recent version of the iPhone software, you don't need to do anything. This includes iOS versions 15 through 26, which fix the security holes that the exploit kits used to attack.

Apple is telling some people to do the following: For older devices that can't get the latest version of iOS, they should update to iOS 15.8.7, iPadOS 15.8.7, iOS 16.7.15, and iPadOS 16.7.15. For devices with iOS 13 or iOS 14, they should update to iOS 15 to get the latest protections and a Critical Security Update that is expected to be pushed out in the "next few days." If you can't update your device, you might want to turn on Lockdown Mode, if it's available.

This will make it harder for attackers to get into your device and protect you from harmful web content and other threats.

Cupertino said, "The most important thing you can do to keep your Apple products safe is to keep your software up to date. Devices with updated software were not at risk from these reported attacks." Apple's warning comes after reports that two iOS exploits have been used by a number of different threat actors with different goals to steal private information from hacked devices.

These kits are sent through compromised websites in a watering hole attack. iVerify said that the findings show that other threat actors are using iOS vulnerabilities on a large scale, which were once used to selectively target people in state-sponsored mobile spyware attacks.

Spencer Parker, chief product officer at iVerify, said, "The exploit's relative simplicity to deploy, along with its quick adoption by multiple threat actors in multiple countries, signals that these powerful tools are now readily available on the secondary market for less-sophisticated actors." He also said, "nation-state-grade mobile exploitation is now available for mass attack." "This is a new level of scale, which means that widespread mobile attacks are a serious and unavoidable problem for all businesses."

The evidence shows that these exploits are easy to reuse and redeploy, which means that modified deployments are probably actively infecting users who haven't patched their systems.