Techoreon

  • Home
  • AI
  • Tips & Tricks
  • Info
    • Privacy Policy
    • DMCA & Copyright Notice
    • Contact Us
    • About Us
    • Terms and Conditions
Notification Show More
Latest News
German Court Hits Google With €465m Fine for 15 Years of Search Power Abuse
German Court Hits Google With €465m Fine for 15 Years of Search Power Abuse
Google
Google Files Lawsuit to Dismantle ‘Lighthouse’ Phishing Kit Behind Global Smishing Attacks
Google Files Lawsuit to Dismantle ‘Lighthouse’ Phishing Kit Behind Global Smishing Attacks
Cybersecurity
German Court Orders OpenAI to Pay Damages for Using Copyrighted Song Lyrics to Train ChatGPT
German Court Orders OpenAI to Pay Damages for Using Copyrighted Song Lyrics to Train ChatGPT
OpenAI AI
Anthropic Signs Multi-Billion Dollar Google Cloud Deal for Up to One Million TPUs-1
Anthropic Signs Multi-Billion Dollar Google Cloud Deal for Up to One Million TPUs
AI Google
Amazon Says It Was a DNS Error That Knocked AWS Offline for Hours
Amazon Says It Was a DNS Error That Knocked AWS Offline for Hours
Internet
Aa

Techoreon

Aa
  • Home
  • AI
  • Tips & Tricks
Search
  • Home
  • Privacy Policy
  • Contact Us
  • About Us
  • Terms and Conditions
  • DMCA & Copyright Notice
Follow US
Techoreon > Apple > HTTP Flaw in Apple’s Passwords App Left iPhone Users Vulnerable to Phishing for Over 3 Months
Apple

HTTP Flaw in Apple’s Passwords App Left iPhone Users Vulnerable to Phishing for Over 3 Months

Piyush Gupta
Last updated: 2025/03/21 at 8:47 AM
Piyush Gupta
Share
11 Min Read
Apple Passwords App icon
A reported HTTP flaw in Apple's Passwords App left iPhone users vulnerable to phishing attacks for years.
SHARE

That Apple has a huge focus on security is no secret. For years, the company has professed a series of privacy and security standards worldwide that it strictly enforces, whether it’s shielding iPhone components to prevent theft or strengthening online protection for children and teens. However, a flaw has just been discovered that affected Apple’s Passwords app, exposing credentials for nearly three months.

This is revealed by both the duo of iOS researchers and developers nicknamed Mysk and the media 9to5Mac, which discovered an HTTP security problem in the application from its launch in iOS 18 until it was patched in iOS 18.2. This problem would have left the passwords of the service users unprotected against phishing attacks all this time, redirecting HTTP requests to malicious websites.

The Passwords app in question was sending unencrypted requests for logos and icons associated with users’ stored passwords. An attacker on the same Wi-Fi network and with privileged access could redirect a user’s traffic to a phishing site where login information could be stolen. However, Apple eventually patched this flaw in iOS 18.2.

Problem with the Passwords app

Mysk researchers reveal the flaw in a video that’s barely 50 seconds long, in which the problem can be seen being “activated.” The key lies in the app’s ability to change a vulnerable password; since its launch, Passwords has warned users about compromised or easy-to-guess passwords, offering them the option to change them.

This is where the app allows access to the password-changing website via an insecure HTTP protocol. “This allowed an attacker with privileged network access to easily intercept and redirect requests to a phishing website,” the developers explain. The Passwords app makes an HTTP request to open the link, without using the encrypted HTTPS protocol. A privileged user on a malicious network can redirect these requests to send the victim to a fake website, which can then be used to steal their login information.

Apple's Passwords app was vulnerable to phishing attacks in iOS versions prior to 18.2. Its functionality to change a password from within the app used to open an account's website via insecure HTTP by default. This allowed an attacker with privileged network access to easily… pic.twitter.com/VrqFWSk4z1

— Mysk 🇨🇦🇩🇪 (@mysk_co) March 18, 2025

According to 9to5Mac, the issue originated with the release of Passwords as a standalone app in iOS 18 and was fixed in the iOS 18.2 update. Mysk claims that Apple recently deleted the security report, preventing them from discussing the flaw earlier. As if that weren’t enough, there will be no bounty for the discovery of this flaw, according to Apple, because it doesn’t meet “the impact criteria” or fall “into any of the eligible categories.”

In addition to all this, the developer duo makes a correction: this bug would not have been present for months, but years. “Apple Passwords had been using insecure HTTP by default since the feature to detect compromised passwords was introduced in iOS 14. The dedicated Passwords app in iOS 18 was essentially a repackage of the old password manager that was in Settings, and which retained all of its bugs,” they report from X (formerly Twitter).

Also Read

Loading title…

If the developers were able to discover the problem, it was after reviewing the Privacy Report provided by one of the duo’s iPhone members. In that report, Mysk discovered that Passwords had contacted 130 different websites using the insecure HTTP protocol. They discovered that the app not only obtained account icons and logos via HTTP, but also opened password reset pages using this same standard. 

This, in Mysk’s eyes, was quite unusual. “We were surprised that Apple didn’t implement HTTPS by default for such a sensitive app. Additionally, Apple should offer an option for security-conscious users to completely disable icon downloads,” the developers explain. “I’m uncomfortable with my password manager constantly pinging every website I have a password for, even though the requests Passwords sends don’t include any IDs.”

It’s worth noting that most websites today allow unencrypted HTTP connections, although they often automatically redirect these connections to HTTPS using 301 redirects. Passwords already made these requests over HTTP, leading to this secure redirect to HTTPS. Under most common circumstances, this wouldn’t pose a problem, as password changes are performed on an encrypted page.

The problem arises when using public networks, which are easily hacked and, in many cases, are controlled by attackers. They can intercept initial HTTP requests before they are redirected, manipulating traffic and directing the victim to a malicious website that mimics the software developer’s site. For example, if a user wants to change their Microsoft account password and an attacker intercepts their request, they can be taken to a website copied from Microsoft and obtain their login credentials.


Also Read

Loading title…

TAGGED: Apple, Cyberthreats, iOS, iPhone, Phishing
Share this Article
Facebook Twitter Copy Link Print

Latest Posts

German Court Hits Google With €465m Fine for 15 Years of Search Power Abuse
Google

German Court Hits Google With €465m Fine for 15 Years of Search Power Abuse

Owen Parker Owen Parker November 14, 2025
Google Files Lawsuit to Dismantle ‘Lighthouse’ Phishing Kit Behind Global Smishing Attacks
Cybersecurity

Google Files Lawsuit to Dismantle ‘Lighthouse’ Phishing Kit Behind Global Smishing Attacks

Dev Mehta Dev Mehta November 14, 2025
German Court Orders OpenAI to Pay Damages for Using Copyrighted Song Lyrics to Train ChatGPT
OpenAIAI

German Court Orders OpenAI to Pay Damages for Using Copyrighted Song Lyrics to Train ChatGPT

Owen Parker Owen Parker November 12, 2025
Anthropic Signs Multi-Billion Dollar Google Cloud Deal for Up to One Million TPUs-1
AIGoogle

Anthropic Signs Multi-Billion Dollar Google Cloud Deal for Up to One Million TPUs

Dev Mehta Dev Mehta October 24, 2025
Amazon Says It Was a DNS Error That Knocked AWS Offline for Hours
Internet

Amazon Says It Was a DNS Error That Knocked AWS Offline for Hours

Owen Parker Owen Parker October 22, 2025
walmart-and-openai-partner-to-let-users-shop-directly-via-chatgpt
AIOpenAI

Walmart and OpenAI Partner to Let Users Shop Directly via ChatGPT

Dev Mehta Dev Mehta October 16, 2025
Show More

© 2025 Techoreon. All rights reserved.

  • Home
  • Privacy Policy
  • Contact Us
  • About Us
  • Terms and Conditions
  • DMCA & Copyright Notice

Removed from reading list

Undo
Welcome Back!

Sign in to your account

Lost your password?