Apple has issued an additional iOS 18 update, extending a critical security patch to a broader range of iPhone users after growing concerns about an active exploit chain known as DarkSword. The update, labeled iOS 18.7.7, is now available to all devices still running iOS 18, including those capable of upgrading to newer versions but not yet updated .
DarkSword is not a single vulnerability but a sequence of linked exploits that can be used together to gain unauthorized access to devices. According to findings from Google’s Threat Intelligence Group, the exploit chain has been used in targeted campaigns involving surveillance and financial theft. Reports indicate that attacks have affected users across multiple regions, including parts of Southeast Asia, the Middle East, and Eastern Europe. The nature of these exploits underscores a broader trend in cybersecurity, where attackers increasingly rely on chaining multiple weaknesses rather than exploiting a single flaw.
Apple had previously released a fix for older devices that are unable to run newer operating systems, but that left a gap for users who remained on iOS 18 by choice. This latest update effectively closes that gap through what is known in the industry as “backporting,” a process where security fixes are applied to older software versions instead of requiring a full system upgrade. While this approach is common in enterprise environments, it is less consistently applied in consumer ecosystems, where companies often prioritize pushing users toward the latest software.
The delay in delivering this patch to all iOS 18 users has drawn some criticism, particularly given that the exploit was already being used in real-world attacks. It highlights an ongoing tension between maintaining older systems and encouraging adoption of newer ones. Apple has continued to emphasize that its latest operating system offers the strongest protections, but this update suggests a recognition that not all users upgrade on the same timeline.
From a practical standpoint, the update process remains straightforward. Users can install the patch through the standard software update menu, and those with automatic updates enabled may receive it without manual intervention. Still, the situation serves as a reminder that software updates are not only about new features but also about addressing evolving security risks.
The release of iOS 18.7.7 also reflects a larger shift in how platform owners handle security disclosures. As threat intelligence becomes more visible and coordinated across companies, there is increasing pressure to respond quickly and transparently. In this case, the involvement of external researchers and the documented use of the exploit in active campaigns likely accelerated the decision to expand the patch.
For users who remain on older operating systems, this update provides a necessary safeguard, but it also reinforces the importance of staying current where possible. As exploit chains become more sophisticated, delays in patching—even within supported software versions—can create meaningful exposure.
