Monday, January 6, 2025
HomeSecurity NewsNew ChaiOS "Text Bomb" Bug that can Crash any iPhones, iPads and...

New ChaiOS “Text Bomb” Bug that can Crash any iPhones, iPads and Macs with a Single Link

Published on

A new bug dubbed chaiOS ” Text Bomb ” can affect iMessage apps on macOS and iOS. On iPhone, a single malicious link can cause the device to crash and with macOS, it kills safari browser.

The bug was discovered by Abraham Masri and it makes the target device to freeze, drain the battery and possibly restart.

He posted the PoC link in GitHub and reported in twitter, at the time of writing the link ends up with 404, seems GitHub administrator removed it.

- Advertisement - SIEM as a Service

https://twitter.com/cheesecakeufo/status/953401511429726210

9to5mac reported the chaiOS bug and had mixed results “In some instances, sending the link would cause both the sender and recipient’s device to respiring or cause the Messages app to instantly freeze and crash“.

ChaiOS bug tested with iOS 11.1.2, users don’t require to do any installation, all they need to do is simply sending the malicious link in an SMS message.

The flaw resembles Effective Power bug which hits iPhone a few years before. ChaiOS will not make a serious impact as of now, it can be used to play pranks.

Also Read Apple Released a Critical Security Updates for iOS 11.2.1

“I found a (small) bug that causes the device to freeze, respring, drains the battery, and/or sometimes panic,” says Abraham Masri.

No need to install anything. Just open, tap then paste. Here you can see how it works.

Mitigations – Text Bomb

  • Forcing the message app to close and delete the thread.
  • Reddit user “TeCHEyE_RDT” suggested to send a message to yourself and delete the threat.
Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

PoC Exploit Released for Critical OpenSSH Vulnerability (CVE-2024-6387)

An alarming new development emerged in the cybersecurity landscape with the release of a...

Malicious EditThisCookie Extension Attacking Chrome Users to Steal Data

The popular cookie management extension EditThisCookie has been the target of a malicious impersonation....

WordPress Plugin Vulnerability Exposes 3 Million Websites to Injection Attacks

A critical vulnerability has been identified in the popular UpdraftPlus: WP Backup & Migration...

iPhone Sharing the Photos by Default to Apple

A recent blog post by developer Jeff Johnson has brought to light a new...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

LegionLoader Abusing Chrome Extensions To Deliver Infostealer Malware

LegionLoader, a C/C++ downloader malware, first seen in 2019, delivers payloads like malicious Chrome...

North Korean Hackers Stolen $2.2 Billion From Crypto Platforms In 2024

Cryptocurrency hacking incidents in 2024 surged 21.07% YoY to $2.2 billion, with 303 breaches...

Deloitte Denies Breach, Claims Only Single System Affected

Ransomware group Brain Cipher claimed to have breached Deloitte UK and threatened to publish...