Close Menu
geekfence.comgeekfence.com
    What's Hot

    Health and wellness influencers dominate social media. A new report shines a light on who they actually are.

    May 7, 2026

    The Best Risk Mitigation Strategy in Data? A Single Source of Truth – O’Reilly

    May 7, 2026

    Build streaming applications on Amazon Managed Service for Apache Flink with AI-assisted guidance

    May 7, 2026
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    Facebook Instagram
    geekfence.comgeekfence.com
    • Home
    • UK Tech News
    • AI
    • Big Data
    • Cyber Security
      • Cloud Computing
      • iOS Development
    • IoT
    • Mobile
    • Software
      • Software Development
      • Software Engineering
    • Technology
      • Green Technology
      • Nanotechnology
    • Telecom
    geekfence.comgeekfence.com
    Home»Cyber Security»Coruna iOS exploit framework linked to Triangulation attacks
    Cyber Security

    Coruna iOS exploit framework linked to Triangulation attacks

    AdminBy AdminMarch 26, 2026No Comments4 Mins Read10 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    Coruna iOS exploit framework linked to Triangulation attacks
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Coruna iOS exploit framework linked to Triangulation attacks

    The Coruna exploit kit is an evolution of the framework used in the Operation Triangulation espionage campaign, which in 2023 targeted iPhones via zero-click iMessage exploits.

    The software has been expanded to target modern hardware, specifically including Apple’s A17 and M3 chips, as well as operating systems up to iOS 17.2.

    Coruna contains five full iOS exploit chains leveraging 23 vulnerabilities, among them CVE-2023-32434 and CVE-2023-38606 also used in Operation Triangulation.

    After analyzing the exploit code for the two security issues, Kaspersky researchers determined that Coruna ran an updated version of the exploit used in Operation Triangulation that had started since 2019.

    Additional code similarities led to the conclusion that the kit is the successor to the malicious framework leveraged in the Triangulation campaign that also targeted iPhones on Kaspersky’s network.

    “During our analysis we’ve discovered that the kernel exploit for CVE-2023-32434 and CVE-2023-38606 vulnerabilities used in Coruna, in fact, is an updated version of the same exploit that was used in Operation Triangulation,” the researchers say in a report today.

    Kaspersky
    Source: Kaspersky

    Kaspersky’s analysis shows that the attack begins in Safari with a stager that fingerprints the device, selects suitable RCE and PAC exploits, and then retrieves encrypted metadata for subsequent stages.

    The payload downloads additional encrypted components, decrypts them using ChaCha20, decompresses them with LZMA, and parses custom container formats to obtain package information.

    Based on the device’s architecture and iOS version, it selects and executes the appropriate kernel exploit, Mach-O loader, and launcher to deploy the spyware implant.

    Kaspersky’s findings indicate that the payloads support targeting ARM64 and ARM64E architectures, with explicit checks for A17, M3, M3 Pro, and M3 Max chips.

    Also, the package IDs and system checks indicate that the exploits can target:

    • iOS < 14.0 beta 7
    • iOS < 14.7
    • iOS < 16.5 beta 4
    • iOS < 16.6 beta 5
    • iOS < 17.2

    Boris Larin, principal security researcher at Kaspersky Global Research and Analysis Team (GReAT), says the connection with Triangulation became evident after analyzing Coruna’s binaries.

    “Coruna is not a patchwork of public exploits; it is a continuously maintained evolution of the original Operation Triangulation framework.”

    Additionally, the developers continued to update the framework by including checks for newer processors (e.g., M3) and iOS builds.

    Since Coruna has also been used in financially-motivated campaigns aiming to steal cryptocurrency via fake exchange websites, Larin notes that “what began as a precision espionage tool is now deployed indiscriminately.”

    Operation Triangulation was a highly sophisticated iOS espionage campaign that used multiple zero-day exploits to silently infect iPhones and deploy spyware implants.

    It was discovered by Kaspersky during internal WiFi network monitoring in June 2023, though the campaign had started four years earlier.

    In late 2023, the same researchers found that these attacks leveraged undocumented features in Apple chips to bypass hardware-based security protections.

    Another exploit kit, dubbed DarkSword, was disclosed earlier this month by researchers at mobile security companies Lookout and iVerify, and Google.

    Like Coruna, DarkSword is being used by multiple threat actors, but all appear to be leveraging it for espionage operations. It should be noted that DarkSword is now publicly available, which increases the risk of cybercriminals starting to leverage it against unpatched iPhones.

    Apple has published a bulletin to address all these recently uncovered exploit kits, noting that fixes for all flaws have been made available via security updates for the latest, as well as earlier, iOS versions.


    tines

    Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

    Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    The Race to Autonomous Transport Networks: A New Study

    May 7, 2026

    Teenager alleged to be Scattered Spider hacker arrested in Finland, faces US extradition

    May 6, 2026

    FTC to ban data broker Kochava from selling Americans’ location data

    May 5, 2026

    The Year of AI-Assisted Attacks

    May 4, 2026

    Anti-DDoS Firm Heaped Attacks on Brazilian ISPs – Krebs on Security

    May 3, 2026

    This month in security with Tony Anscombe – April 2026 edition

    May 2, 2026
    Top Posts

    Understanding U-Net Architecture in Deep Learning

    November 25, 202536 Views

    Hard-braking events as indicators of road segment crash risk

    January 14, 202626 Views

    Redefining AI efficiency with extreme compression

    March 25, 202625 Views
    Don't Miss

    Health and wellness influencers dominate social media. A new report shines a light on who they actually are.

    May 7, 2026

    A generation or two ago, when you had a medical question, the solution was obvious:…

    The Best Risk Mitigation Strategy in Data? A Single Source of Truth – O’Reilly

    May 7, 2026

    Build streaming applications on Amazon Managed Service for Apache Flink with AI-assisted guidance

    May 7, 2026

    Microsoft’s clean energy target under pressure from AI data centres

    May 7, 2026
    Stay In Touch
    • Facebook
    • Instagram
    About Us

    At GeekFence, we are a team of tech-enthusiasts, industry watchers and content creators who believe that technology isn’t just about gadgets—it’s about how innovation transforms our lives, work and society. We’ve come together to build a place where readers, thinkers and industry insiders can converge to explore what’s next in tech.

    Our Picks

    Health and wellness influencers dominate social media. A new report shines a light on who they actually are.

    May 7, 2026

    The Best Risk Mitigation Strategy in Data? A Single Source of Truth – O’Reilly

    May 7, 2026

    Subscribe to Updates

    Please enable JavaScript in your browser to complete this form.
    Loading
    • About Us
    • Contact Us
    • Disclaimer
    • Privacy Policy
    • Terms and Conditions
    © 2026 Geekfence.All Rigt Reserved.

    Type above and press Enter to search. Press Esc to cancel.