Close Menu
geekfence.comgeekfence.com
    What's Hot

    F1 on Apple TV: How to Watch Australian Grand Prix 2026

    March 6, 2026

    The Download: an AI agent’s hit piece, and preventing lightning

    March 6, 2026

    Microsoft Expands Windows 365 with New Cloud PC Devices from ASUS and Dell

    March 6, 2026
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    Facebook Instagram
    geekfence.comgeekfence.com
    • Home
    • UK Tech News
    • AI
    • Big Data
    • Cyber Security
      • Cloud Computing
      • iOS Development
    • IoT
    • Mobile
    • Software
      • Software Development
      • Software Engineering
    • Technology
      • Green Technology
      • Nanotechnology
    • Telecom
    geekfence.comgeekfence.com
    Home»Cyber Security»Hackers Used New Exploit Kit to Compromise Thousands of iPhones
    Cyber Security

    Hackers Used New Exploit Kit to Compromise Thousands of iPhones

    AdminBy AdminMarch 6, 2026No Comments5 Mins Read1 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    Hackers Used New Exploit Kit to Compromise Thousands of iPhones
    Share
    Facebook Twitter LinkedIn Pinterest Email


    An unknown hooded person hacking a smartphone.
    Image: cait00sith/Envato

    An iOS exploit framework has revealed how advanced mobile attack tools can move rapidly from surveillance operations to espionage and financial crime.

    Google’s Threat Intelligence Group (GTIG) identified Coruna, a powerful exploit kit containing 23 vulnerabilities across five exploit chains that were used to compromise thousands of iPhones throughout 2025.

    “The core technical value of this exploit kit lies in its comprehensive collection of iOS exploits, with the most advanced ones using non-public exploitation techniques and mitigation bypasses,” the researchers said.

    Inside the Coruna iOS exploit framework

    According to Google’s Threat Intelligence Group (GTIG), Coruna was capable of targeting Apple devices running iOS versions released between September 2019 and December 2023.

    Researchers uncovered the toolkit after a threat actor mistakenly deployed a debug version of the framework, inadvertently exposing internal code names and documentation embedded within the exploit kit.

    The discovery provided rare insight into how the framework was structured and how its exploit chains were designed to target different iOS versions.

    Tracking Coruna across multiple threat actors

    GTIG researchers were also able to track Coruna across three distinct threat-actor ecosystems throughout 2025, offering an unusual glimpse into how sophisticated exploit frameworks circulate across the cyber threat landscape.

    In many cases, advanced tools initially developed for surveillance purposes are later reused or repurposed by state-sponsored espionage groups and eventually by financially motivated cybercriminals.

    Coruna’s multi-stage attack campaign

    The earliest observed activity involving Coruna occurred in February 2025, when researchers identified components of an exploit chain delivered through a previously unknown JavaScript framework.

    The code was designed to fingerprint visiting devices by identifying the iPhone model and installed iOS version before delivering a tailored exploit.

    Once a compatible target was identified, the framework triggered a WebKit remote code execution (RCE) vulnerability followed by a Pointer Authentication Code (PAC) bypass, enabling attackers to execute malicious code on the device and advance further along the exploitation chain.

    By summer 2025, the same infrastructure appeared in campaigns linked to a Russian espionage group tracked as UNC6353.

    In this phase, attackers injected malicious code into dozens of compromised Ukrainian websites spanning industries such as retail, industrial services, and e-commerce. The exploit chain was delivered through a hidden iFrame hosted on the domain cdn.uacounter[.]com.

    To reduce detection and increase targeting precision, the exploit was selectively triggered only for iPhone users located within specific geographic regions.

    In late 2025, researchers discovered the complete Coruna exploit kit being used in a campaign attributed to a financially motivated Chinese threat group tracked as UNC6691. In this stage, attackers deployed the exploit across a network of fraudulent cryptocurrency and financial websites designed to lure victims to visit the pages on an iPhone.

    One example involved a fake website impersonating the WEEX cryptocurrency exchange that displayed pop-up prompts encouraging users to access the platform on their mobile devices to trigger the exploit chain.

    Must-read security coverage

    How the Coruna exploit kit works

    At its core, Coruna contains 23 exploits organized into five full attack chains, allowing attackers to progress from an initial browser compromise to full device control.

    The framework combines multiple vulnerability classes, including WebKit memory-corruption flaws, sandbox-escape vulnerabilities, privilege-escalation techniques, and Page Protection Layer (PPL) bypasses that allow attackers to gain deeper control over the operating system.

    Key vulnerabilities used in the exploit framework include:

    • CVE-2021-30952 – WebKit read/write vulnerability
    • CVE-2023-32409 – Sandbox escape vulnerability
    • CVE-2023-32434 – Privilege escalation flaw
    • CVE-2024-23222 and CVE-2024-23225 – Page Protection Layer (PPL) bypass techniques

    Two exploits within the framework — Photon and Gallium — were previously associated with Operation Triangulation, the high-profile iOS espionage campaign uncovered by Kaspersky in 2023.

    Their reuse in Coruna demonstrates how threat actors often combine previously discovered vulnerabilities with new exploitation techniques to construct more advanced and reliable attack frameworks.

    How security teams can reduce mobile risk

    Because the attack relies on multiple vulnerabilities, web-based delivery, and post-exploitation data theft, effective defenses require a layered mobile security strategy.

    • Ensure all iPhones are updated to the latest iOS version and enforce automatic patching through mobile device management (MDM).
    • Enable Apple Lockdown Mode on high-risk or executive devices, as Coruna terminates exploitation when this feature is active.
    • Deploy mobile threat defense (MTD) solutions integrated with MDM to detect exploit attempts, suspicious behavior, and anomalous network activity.
    • Monitor network traffic for indicators of compromise, including connections to suspicious *.xyz domains and unusual HTTP headers such as sdkv or x-ts.
    • Restrict access to unverified financial and cryptocurrency websites, and limit the installation of high-risk applications, such as crypto wallets, on corporate devices.
    • Harden enterprise iOS configurations by enforcing app allowlists, restricting untrusted profiles, and limiting unnecessary device services or sharing features.
    • Regularly test incident response plans and mobile security playbooks to ensure teams can quickly detect, investigate, and contain mobile device compromise.

    By implementing these measures, organizations can limit the potential blast radius of mobile compromises while building resilience.

    Editor’s note: This article originally appeared on our sister website, eSecurityPlanet.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    February 2026 – Month of Smart Connections

    March 5, 2026

    They seized $4.8m in crypto… then gave the master key to the internet

    March 4, 2026

    Cultivating a robust and efficient quantum-safe HTTPS

    March 3, 2026

    Anthropic confirms Claude is down in a worldwide outage

    March 2, 2026

    ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket

    March 1, 2026

    Who is the Kimwolf Botmaster “Dort”? – Krebs on Security

    February 28, 2026
    Top Posts

    Hard-braking events as indicators of road segment crash risk

    January 14, 202619 Views

    Understanding U-Net Architecture in Deep Learning

    November 25, 202518 Views

    How to integrate a graph database into your RAG pipeline

    February 8, 202610 Views
    Don't Miss

    F1 on Apple TV: How to Watch Australian Grand Prix 2026

    March 6, 2026

    Summary created by Smart Answers AIIn summary:Tech Advisor explains how Apple TV offers F1 Australian…

    The Download: an AI agent’s hit piece, and preventing lightning

    March 6, 2026

    Microsoft Expands Windows 365 with New Cloud PC Devices from ASUS and Dell

    March 6, 2026

    Hackers Used New Exploit Kit to Compromise Thousands of iPhones

    March 6, 2026
    Stay In Touch
    • Facebook
    • Instagram
    About Us

    At GeekFence, we are a team of tech-enthusiasts, industry watchers and content creators who believe that technology isn’t just about gadgets—it’s about how innovation transforms our lives, work and society. We’ve come together to build a place where readers, thinkers and industry insiders can converge to explore what’s next in tech.

    Our Picks

    F1 on Apple TV: How to Watch Australian Grand Prix 2026

    March 6, 2026

    The Download: an AI agent’s hit piece, and preventing lightning

    March 6, 2026

    Subscribe to Updates

    Please enable JavaScript in your browser to complete this form.
    Loading
    • About Us
    • Contact Us
    • Disclaimer
    • Privacy Policy
    • Terms and Conditions
    © 2026 Geekfence.All Rigt Reserved.

    Type above and press Enter to search. Press Esc to cancel.