Close Menu
geekfence.comgeekfence.com
    What's Hot

    Live Nation monopoly verdict: Here’s what it means for concerts

    April 17, 2026

    The Download: bad news for inner Neanderthals, and AI warfare’s human illusion

    April 17, 2026

    8 Legit Ways to Get a Free Business Email in 2026

    April 17, 2026
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    Facebook Instagram
    geekfence.comgeekfence.com
    • Home
    • UK Tech News
    • AI
    • Big Data
    • Cyber Security
      • Cloud Computing
      • iOS Development
    • IoT
    • Mobile
    • Software
      • Software Development
      • Software Engineering
    • Technology
      • Green Technology
      • Nanotechnology
    • Telecom
    geekfence.comgeekfence.com
    Home»Cyber Security»Coruna iOS exploit framework linked to Triangulation attacks
    Cyber Security

    Coruna iOS exploit framework linked to Triangulation attacks

    AdminBy AdminMarch 26, 2026No Comments4 Mins Read8 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    Coruna iOS exploit framework linked to Triangulation attacks
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Coruna iOS exploit framework linked to Triangulation attacks

    The Coruna exploit kit is an evolution of the framework used in the Operation Triangulation espionage campaign, which in 2023 targeted iPhones via zero-click iMessage exploits.

    The software has been expanded to target modern hardware, specifically including Apple’s A17 and M3 chips, as well as operating systems up to iOS 17.2.

    Coruna contains five full iOS exploit chains leveraging 23 vulnerabilities, among them CVE-2023-32434 and CVE-2023-38606 also used in Operation Triangulation.

    After analyzing the exploit code for the two security issues, Kaspersky researchers determined that Coruna ran an updated version of the exploit used in Operation Triangulation that had started since 2019.

    Additional code similarities led to the conclusion that the kit is the successor to the malicious framework leveraged in the Triangulation campaign that also targeted iPhones on Kaspersky’s network.

    “During our analysis we’ve discovered that the kernel exploit for CVE-2023-32434 and CVE-2023-38606 vulnerabilities used in Coruna, in fact, is an updated version of the same exploit that was used in Operation Triangulation,” the researchers say in a report today.

    Kaspersky
    Source: Kaspersky

    Kaspersky’s analysis shows that the attack begins in Safari with a stager that fingerprints the device, selects suitable RCE and PAC exploits, and then retrieves encrypted metadata for subsequent stages.

    The payload downloads additional encrypted components, decrypts them using ChaCha20, decompresses them with LZMA, and parses custom container formats to obtain package information.

    Based on the device’s architecture and iOS version, it selects and executes the appropriate kernel exploit, Mach-O loader, and launcher to deploy the spyware implant.

    Kaspersky’s findings indicate that the payloads support targeting ARM64 and ARM64E architectures, with explicit checks for A17, M3, M3 Pro, and M3 Max chips.

    Also, the package IDs and system checks indicate that the exploits can target:

    • iOS < 14.0 beta 7
    • iOS < 14.7
    • iOS < 16.5 beta 4
    • iOS < 16.6 beta 5
    • iOS < 17.2

    Boris Larin, principal security researcher at Kaspersky Global Research and Analysis Team (GReAT), says the connection with Triangulation became evident after analyzing Coruna’s binaries.

    “Coruna is not a patchwork of public exploits; it is a continuously maintained evolution of the original Operation Triangulation framework.”

    Additionally, the developers continued to update the framework by including checks for newer processors (e.g., M3) and iOS builds.

    Since Coruna has also been used in financially-motivated campaigns aiming to steal cryptocurrency via fake exchange websites, Larin notes that “what began as a precision espionage tool is now deployed indiscriminately.”

    Operation Triangulation was a highly sophisticated iOS espionage campaign that used multiple zero-day exploits to silently infect iPhones and deploy spyware implants.

    It was discovered by Kaspersky during internal WiFi network monitoring in June 2023, though the campaign had started four years earlier.

    In late 2023, the same researchers found that these attacks leveraged undocumented features in Apple chips to bypass hardware-based security protections.

    Another exploit kit, dubbed DarkSword, was disclosed earlier this month by researchers at mobile security companies Lookout and iVerify, and Google.

    Like Coruna, DarkSword is being used by multiple threat actors, but all appear to be leveraging it for espionage operations. It should be noted that DarkSword is now publicly available, which increases the risk of cybercriminals starting to leverage it against unpatched iPhones.

    Apple has published a bulletin to address all these recently uncovered exploit kits, noting that fixes for all flaws have been made available via security updates for the latest, as well as earlier, iOS versions.


    tines

    Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

    Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    Patch Tuesday, April 2026 Edition – Krebs on Security

    April 17, 2026

    Here’s how to avoid a ‘second strike’

    April 16, 2026

    Adobe Issues Emergency Patch for Critical PDF Flaw Exploited For Months

    April 15, 2026

    Sustainability 101: Let’s talk about energy efficiency

    April 14, 2026

    LinkedIn is spying on you, and you agreed to nothing • Graham Cluley

    April 13, 2026

    Bringing Rust to the Pixel Baseband

    April 12, 2026
    Top Posts

    Understanding U-Net Architecture in Deep Learning

    November 25, 202529 Views

    Hard-braking events as indicators of road segment crash risk

    January 14, 202624 Views

    Redefining AI efficiency with extreme compression

    March 25, 202623 Views
    Don't Miss

    Live Nation monopoly verdict: Here’s what it means for concerts

    April 17, 2026

    This story appeared in Today, Explained, a daily newsletter that helps you understand the most…

    The Download: bad news for inner Neanderthals, and AI warfare’s human illusion

    April 17, 2026

    8 Legit Ways to Get a Free Business Email in 2026

    April 17, 2026

    Patch Tuesday, April 2026 Edition – Krebs on Security

    April 17, 2026
    Stay In Touch
    • Facebook
    • Instagram
    About Us

    At GeekFence, we are a team of tech-enthusiasts, industry watchers and content creators who believe that technology isn’t just about gadgets—it’s about how innovation transforms our lives, work and society. We’ve come together to build a place where readers, thinkers and industry insiders can converge to explore what’s next in tech.

    Our Picks

    Live Nation monopoly verdict: Here’s what it means for concerts

    April 17, 2026

    The Download: bad news for inner Neanderthals, and AI warfare’s human illusion

    April 17, 2026

    Subscribe to Updates

    Please enable JavaScript in your browser to complete this form.
    Loading
    • About Us
    • Contact Us
    • Disclaimer
    • Privacy Policy
    • Terms and Conditions
    © 2026 Geekfence.All Rigt Reserved.

    Type above and press Enter to search. Press Esc to cancel.