A major hacking tool has leaked online, putting millions of iPhones at risk. Here’s what you need to know

Security researchers have sounded a global alarm following the discovery of sophisticated cyberattacks aimed at Apple customers across the world. These highly advanced hacking campaigns leverage tools identified as "Coruna" and "DarkSword," which have been deployed by both state-sponsored espionage units and opportunistic cybercriminals to illicitly extract sensitive data from iPhones and iPads. This development marks a rare and concerning instance of widespread vulnerability affecting Apple’s typically resilient ecosystem, prompting urgent calls for users to update their devices and take proactive security measures.

The Emergence of a New Threat Landscape: Coruna and DarkSword Unveiled

At the heart of these revelations are Coruna and DarkSword, two distinct yet equally potent sets of hacking toolkits. Each toolkit comprises a formidable array of exploits designed to breach the formidable security layers of Apple’s iOS operating system, granting attackers unauthorized access to a victim’s personal data. This data includes, but is not limited to, private messages, browser history, precise location data, and even cryptocurrency holdings – a treasure trove for malicious actors.

Security experts who first identified these toolkits report that Coruna’s exploits are capable of compromising iPhones and iPads running iOS versions from iOS 13 up to iOS 17.2.1, a version released in December 2023. DarkSword, on the other hand, presents an even more contemporary threat, containing exploits that can penetrate devices operating on more recent software, specifically iOS 18.4 and iOS 18.7, which were rolled out in September 2025. This broader reach across recent iOS versions underscores the advanced nature of these exploits, which likely targeted previously unknown or unpatched vulnerabilities within Apple’s software.

The immediate public threat posed by DarkSword has been dramatically escalated by a recent leak. Portions of the DarkSword toolkit were publicly published on the code-sharing platform GitHub, effectively transforming highly specialized hacking tools into "plug-and-play" instruments accessible to a wider array of cybercriminals. This public exposure has significantly lowered the technical barrier for launching attacks, potentially endangering hundreds of millions of iPhones and iPads still running out-of-date software.

A History of Rare Breaches: Contextualizing the Current Vulnerability

Widespread hacking campaigns targeting iPhone and iPad users are historically uncommon, a testament to Apple’s robust security architecture and rapid patching cycles. Over the past decade, precedents for such large-scale attacks have been limited to highly specific, often state-sponsored operations against targeted populations. Notable examples include the attacks observed against Uyghur Muslims in China, where sophisticated surveillance tools were used to monitor and collect data from devices belonging to this persecuted ethnic minority. Another significant instance involved attacks on individuals in Hong Kong, particularly during periods of political unrest, where similar "watering hole" tactics were employed to compromise devices of activists and journalists. These previous incidents, while severe for those targeted, did not typically escalate to the level of global, indiscriminate threat now presented by the leaked DarkSword tools.

The current situation, where advanced exploits are not only being actively used but also publicly disseminated, represents a concerning escalation. It shifts the threat landscape from highly specialized, state-level targeting to a much broader, potentially indiscriminate risk for the general user base.

The Mechanics of Intrusion: How Coruna and DarkSword Operate

The modus operandi of Coruna and DarkSword typifies a dangerous form of "watering hole" attack. This technique involves compromising legitimate websites that are frequently visited by the intended targets. When a victim navigates to one of these compromised sites, the malicious code embedded within it silently exploits vulnerabilities in their iPhone or iPad’s operating system. These attacks are, by their very nature, indiscriminate; anyone visiting a website hosting the malicious code can be ensnared, often without any indication of compromise.

Upon initial infection, Coruna and DarkSword leverage a series of exploits to establish a foothold on the target device. These exploits allow the attackers to virtually seize full control of the iPhone or iPad, circumventing its security features. Once control is established, the tools proceed to systematically pilfer private data – messages, browsing history, location logs, and even sensitive financial information like cryptocurrency wallet data. This stolen information is then covertly uploaded to command-and-control servers operated by the hackers, often located in various jurisdictions to obscure their tracks. The entire process is designed to be stealthy, operating in the background without alerting the user.

Tracing the Origins: The Troubling Proliferation of Coruna

The journey of the Coruna toolkit reveals a deeply concerning aspect of the global cybersecurity landscape: the proliferation of powerful hacking tools originally developed by state-backed entities. TechCrunch previously reported that at least some components of the Coruna toolkit were likely developed by Trenchant, a specialized hacking and spyware unit within L3Harris, a prominent U.S. defense contractor. Trenchant is known to develop and sell sophisticated cyber capabilities, including zero-day exploits, to the U.S. government and its closest allies.

The fact that these exploits, developed under tight secrecy restrictions for national security purposes, subsequently found their way into the hands of Russian spies and Chinese cybercriminals underscores a critical vulnerability in the ecosystem of cyber warfare. It remains unclear precisely how Coruna transitioned from a supposedly secure, government-controlled asset to a tool wielded by adversaries. Potential vectors include theft, accidental leak, or sale through intermediaries in the clandestine exploit market. This phenomenon is not unprecedented. A stark reminder is the 2017 leak of an exploit developed by the U.S. National Security Agency (NSA), codenamed "EternalBlue," which was capable of remotely compromising Windows computers worldwide. This leaked exploit was subsequently weaponized in the devastating WannaCry ransomware attack, which indiscriminately crippled hundreds of thousands of computers globally, including critical infrastructure and healthcare systems. The Coruna incident serves as a fresh, potent warning that the creation and stockpiling of powerful cyber weapons, even for defensive or intelligence purposes, carries inherent risks of uncontrolled proliferation and subsequent misuse.

Furthermore, cybersecurity firm Kaspersky has linked two specific exploits within the Coruna toolkit to "Operation Triangulation," a complex and highly sophisticated cyberattack believed to be government-led. This operation was notably used against Russian iPhone users, including Kaspersky’s own employees, highlighting a potential cycle of exploit development, acquisition, and deployment among various state actors.

The Enigma of DarkSword: Unanswered Questions and Global Reach

In contrast to Coruna, the origins of DarkSword remain shrouded in mystery. Security researchers have yet to conclusively identify who initially developed this advanced toolkit, how it subsequently ended up with diverse hacking groups, or, most critically, who was responsible for its public leak on GitHub. Despite these unanswered questions, observations indicate that DarkSword has been deployed in attacks targeting users across a wide geographical spread, including China, Malaysia, Turkey, Saudi Arabia, and Ukraine. This broad targeting suggests either multiple actors with access to the toolkit or a single, highly capable group with diverse geopolitical interests.

The individual or entity responsible for leaking DarkSword to GitHub also remains unknown, as do their motivations. Possible reasons range from a disgruntled insider, a whistleblower aiming to expose state-sponsored cyber capabilities, a rival hacking group seeking to disrupt operations, or even an accidental exposure. Regardless of the motive, the consequence is profound: a powerful exploit kit, written in accessible web languages like HTML and JavaScript, is now readily available. Researchers posting on social media platforms like X (formerly Twitter) have already demonstrated the functionality of the leaked tools by successfully compromising their own vulnerable Apple devices, validating the "plug-and-play" assessment provided by experts like Justin Albrecht, a principal researcher at mobile security firm Lookout.

GitHub’s decision to maintain the leaked code on its platform has also drawn attention. While GitHub’s Acceptable Use Policies strictly prohibit content that directly supports unlawful active attacks or malware campaigns causing technical harm, the company’s online safety counsel, Jesse Geraci, explained that they do not prohibit the posting of source code that could be used to develop malware or exploits. This stance is rooted in the belief that the publication and distribution of such source code holds significant educational value and provides a net benefit to the security community, allowing researchers to study and develop defenses against emerging threats. This position highlights the ongoing tension between preventing immediate harm and fostering security research.

Protecting Your Device: Urgent Steps for Apple Users

Given the immediate and widespread threat posed by the leaked DarkSword exploits, alongside the ongoing risks from Coruna, Apple users are strongly advised to take immediate action to secure their devices.

1. Update Your iOS Immediately: This is the most critical step. Apple has confirmed that users running the latest versions of iOS 15 through iOS 26 are protected against these specific vulnerabilities. More precisely, security firm iVerify strongly recommends updating to iOS 18.7.6 or iOS 26.3.1 to mitigate all known vulnerabilities exploited in these attack chains. According to Apple’s own statistics, nearly one in three iPhone and iPad users are currently not running the latest iOS 26 software. Considering Apple touts over 2.5 billion active devices globally, this means potentially hundreds of millions of devices are vulnerable to these sophisticated hacking tools. Users should navigate to Settings > General > Software Update to check for and install the latest available version for their device.

2. Enable Lockdown Mode (If Applicable): For users who cannot or choose not to upgrade to the absolute latest iOS versions, or for those who face an elevated risk of targeted cyberattacks (such as journalists, dissidents, human rights activists, or individuals in high-profile positions), Apple’s Lockdown Mode offers an additional layer of robust protection. Introduced in iOS 16, Lockdown Mode is an opt-in security feature that drastically reduces the attack surface of a device by disabling certain features and hardening others. Apple has stated that Lockdown Mode effectively blocks these specific Coruna and DarkSword attacks. While not entirely foolproof, there has been no public evidence to date of hackers successfully bypassing its protections. Lockdown Mode has been credited with preventing at least one attempt to implant spyware on a human rights defender’s phone. Users can enable Lockdown Mode in Settings > Privacy & Security > Lockdown Mode. It is important to note that enabling Lockdown Mode may slightly impact device functionality and user experience by restricting certain features.

3. Practice General Cyber Hygiene: Beyond specific updates, maintaining good cybersecurity habits is crucial:

  • Be Wary of Suspicious Links: Exercise extreme caution when clicking on links received via email, text messages, or social media, even if they appear to come from trusted sources.
  • Avoid Unverified Websites: Stick to reputable websites, especially for sensitive transactions. The "watering hole" attacks rely on users visiting compromised sites.
  • Use Strong, Unique Passwords: Employ complex passwords for all accounts and enable two-factor authentication (2FA) wherever possible.
  • Regularly Back Up Your Data: In the event of a compromise, a recent backup can significantly reduce data loss.
  • Review App Permissions: Periodically check the permissions granted to apps on your device and revoke access for those that seem excessive or unnecessary.

Broader Implications and the Future of Mobile Security

The Coruna and DarkSword incidents underscore several critical implications for the future of mobile security and the broader digital landscape. Firstly, they highlight the persistent "arms race" between security researchers and malicious actors, where new vulnerabilities are constantly discovered and exploited. Secondly, the proliferation of state-developed exploits, whether through leaks or illicit sales, presents an escalating global threat. Governments and defense contractors face an ethical and practical dilemma regarding the development and stockpiling of such powerful tools, as their uncontrolled spread can lead to widespread harm.

Thirdly, the incident emphasizes the critical role of software updates. Despite Apple’s efforts, a significant portion of its user base lags in adopting the latest security patches, leaving them exposed. This highlights a need for better user education and potentially more aggressive update prompts from device manufacturers. Finally, the debate surrounding GitHub’s decision to host the leaked exploit code reflects a larger discussion within the cybersecurity community about responsible disclosure, the balance between academic freedom, security research, and the potential for malicious use.

As cyber threats continue to evolve in sophistication and reach, collaboration among technology companies, security researchers, governments, and the informed vigilance of individual users will be paramount in safeguarding the integrity of our digital lives. The Coruna and DarkSword saga serves as a stark reminder that even the most secure systems are not impregnable, and constant vigilance is the price of digital safety.

Related Posts

Wikipedia Enforces Sweeping Ban on AI-Generated Text for Article Content Amidst Growing Editorial Concerns

In a significant move reflecting the ongoing global debate about artificial intelligence’s role in content creation, Wikipedia has formally prohibited its volunteer editors from using large language models (LLMs) to…

Federal Judge Sides with Anthropic, Halting Trump Administration’s "Supply Chain Risk" Designation

A significant legal victory has been secured by Anthropic, a leading artificial intelligence developer, against the Trump administration. A federal judge has issued an injunction, compelling the government to rescind…

Leave a Reply

Your email address will not be published. Required fields are marked *

You Missed

The Rise of the Enough-luencers: Finding Contentment in a World of Less

The Rise of the Enough-luencers: Finding Contentment in a World of Less

Italian Competition Authority Launches Investigations into Sephora and Benefit Cosmetics for Marketing Adult Products to Minors

Italian Competition Authority Launches Investigations into Sephora and Benefit Cosmetics for Marketing Adult Products to Minors

A Curated Guide to the Retail Landscape and Commercial Evolution of Montreal

A Curated Guide to the Retail Landscape and Commercial Evolution of Montreal

UCLA Health Study Links Long-Term Residential Exposure to Chlorpyrifos with Significantly Increased Parkinson’s Disease Risk

UCLA Health Study Links Long-Term Residential Exposure to Chlorpyrifos with Significantly Increased Parkinson’s Disease Risk

Austria Unveils Ambitious Plan to Ban Children Under 14 from Social Media Amidst Growing Concerns

Austria Unveils Ambitious Plan to Ban Children Under 14 from Social Media Amidst Growing Concerns

Alexander Kluge, Visionary Filmmaker and Architect of New German Cinema, Dies at 94

Alexander Kluge, Visionary Filmmaker and Architect of New German Cinema, Dies at 94