Apple’s Silent iMessage Exploit Fix: The Crypto Heist You Never Heard About
The Full Disclosure mailing list reveals a zero-click iMessage exploit chain, CVE-2025-31200 and CVE-2025-31201, affecting iOS 18.2 to 18.4. It allowed Secure Enclave key theft, wormable RCE, and crypto theft. Despite Apple’s quiet patch, this disclosure aims for transparency, resisting suppression while ensuring user awareness.

Hot Take:
When life gives you zero-click iMessage exploits, make sure you have a zero-click response team ready to roll. Apple may have silently patched this digital Houdini act, but we’re here for the encore performance of transparency, trust, and a touch of crypto theft drama. Grab your popcorn, folks, this vulnerability disclosure is juicier than a gossip column on steroids!
Key Points:
- Zero-click iMessage exploit affects iOS 18.2 to 18.4, patched silently in 18.4.1.
- Enables Secure Enclave key theft, wormable RCE, and undetectable crypto wallet exfiltration.
- Apple’s trust model flaw allowed audio messages to bypass security controls.
- Disclosure aims to resist institutional suppression and promote user awareness.
- Encourages collaboration for further threat modeling and peer review.
Already a member? Log in here