Close Menu
geekfence.comgeekfence.com
    What's Hot

    Can your job be unbundled? If so it is under threat from AI – Computerworld

    March 27, 2026

    Here’s why some people choose cryonics to store their bodies and brains after death

    March 27, 2026

    Maine bans online sweepstakes casino platforms statewide

    March 27, 2026
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    Facebook Instagram
    geekfence.comgeekfence.com
    • Home
    • UK Tech News
    • AI
    • Big Data
    • Cyber Security
      • Cloud Computing
      • iOS Development
    • IoT
    • Mobile
    • Software
      • Software Development
      • Software Engineering
    • Technology
      • Green Technology
      • Nanotechnology
    • Telecom
    geekfence.comgeekfence.com
    Home»Cyber Security»Hackers Used New Exploit Kit to Compromise Thousands of iPhones
    Cyber Security

    Hackers Used New Exploit Kit to Compromise Thousands of iPhones

    AdminBy AdminMarch 6, 2026No Comments5 Mins Read3 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    Hackers Used New Exploit Kit to Compromise Thousands of iPhones
    Share
    Facebook Twitter LinkedIn Pinterest Email


    An unknown hooded person hacking a smartphone.
    Image: cait00sith/Envato

    An iOS exploit framework has revealed how advanced mobile attack tools can move rapidly from surveillance operations to espionage and financial crime.

    Google’s Threat Intelligence Group (GTIG) identified Coruna, a powerful exploit kit containing 23 vulnerabilities across five exploit chains that were used to compromise thousands of iPhones throughout 2025.

    “The core technical value of this exploit kit lies in its comprehensive collection of iOS exploits, with the most advanced ones using non-public exploitation techniques and mitigation bypasses,” the researchers said.

    Inside the Coruna iOS exploit framework

    According to Google’s Threat Intelligence Group (GTIG), Coruna was capable of targeting Apple devices running iOS versions released between September 2019 and December 2023.

    Researchers uncovered the toolkit after a threat actor mistakenly deployed a debug version of the framework, inadvertently exposing internal code names and documentation embedded within the exploit kit.

    The discovery provided rare insight into how the framework was structured and how its exploit chains were designed to target different iOS versions.

    Tracking Coruna across multiple threat actors

    GTIG researchers were also able to track Coruna across three distinct threat-actor ecosystems throughout 2025, offering an unusual glimpse into how sophisticated exploit frameworks circulate across the cyber threat landscape.

    In many cases, advanced tools initially developed for surveillance purposes are later reused or repurposed by state-sponsored espionage groups and eventually by financially motivated cybercriminals.

    Coruna’s multi-stage attack campaign

    The earliest observed activity involving Coruna occurred in February 2025, when researchers identified components of an exploit chain delivered through a previously unknown JavaScript framework.

    The code was designed to fingerprint visiting devices by identifying the iPhone model and installed iOS version before delivering a tailored exploit.

    Once a compatible target was identified, the framework triggered a WebKit remote code execution (RCE) vulnerability followed by a Pointer Authentication Code (PAC) bypass, enabling attackers to execute malicious code on the device and advance further along the exploitation chain.

    By summer 2025, the same infrastructure appeared in campaigns linked to a Russian espionage group tracked as UNC6353.

    In this phase, attackers injected malicious code into dozens of compromised Ukrainian websites spanning industries such as retail, industrial services, and e-commerce. The exploit chain was delivered through a hidden iFrame hosted on the domain cdn.uacounter[.]com.

    To reduce detection and increase targeting precision, the exploit was selectively triggered only for iPhone users located within specific geographic regions.

    In late 2025, researchers discovered the complete Coruna exploit kit being used in a campaign attributed to a financially motivated Chinese threat group tracked as UNC6691. In this stage, attackers deployed the exploit across a network of fraudulent cryptocurrency and financial websites designed to lure victims to visit the pages on an iPhone.

    One example involved a fake website impersonating the WEEX cryptocurrency exchange that displayed pop-up prompts encouraging users to access the platform on their mobile devices to trigger the exploit chain.

    Must-read security coverage

    How the Coruna exploit kit works

    At its core, Coruna contains 23 exploits organized into five full attack chains, allowing attackers to progress from an initial browser compromise to full device control.

    The framework combines multiple vulnerability classes, including WebKit memory-corruption flaws, sandbox-escape vulnerabilities, privilege-escalation techniques, and Page Protection Layer (PPL) bypasses that allow attackers to gain deeper control over the operating system.

    Key vulnerabilities used in the exploit framework include:

    • CVE-2021-30952 – WebKit read/write vulnerability
    • CVE-2023-32409 – Sandbox escape vulnerability
    • CVE-2023-32434 – Privilege escalation flaw
    • CVE-2024-23222 and CVE-2024-23225 – Page Protection Layer (PPL) bypass techniques

    Two exploits within the framework — Photon and Gallium — were previously associated with Operation Triangulation, the high-profile iOS espionage campaign uncovered by Kaspersky in 2023.

    Their reuse in Coruna demonstrates how threat actors often combine previously discovered vulnerabilities with new exploitation techniques to construct more advanced and reliable attack frameworks.

    How security teams can reduce mobile risk

    Because the attack relies on multiple vulnerabilities, web-based delivery, and post-exploitation data theft, effective defenses require a layered mobile security strategy.

    • Ensure all iPhones are updated to the latest iOS version and enforce automatic patching through mobile device management (MDM).
    • Enable Apple Lockdown Mode on high-risk or executive devices, as Coruna terminates exploitation when this feature is active.
    • Deploy mobile threat defense (MTD) solutions integrated with MDM to detect exploit attempts, suspicious behavior, and anomalous network activity.
    • Monitor network traffic for indicators of compromise, including connections to suspicious *.xyz domains and unusual HTTP headers such as sdkv or x-ts.
    • Restrict access to unverified financial and cryptocurrency websites, and limit the installation of high-risk applications, such as crypto wallets, on corporate devices.
    • Harden enterprise iOS configurations by enforcing app allowlists, restricting untrusted profiles, and limiting unnecessary device services or sharing features.
    • Regularly test incident response plans and mobile security playbooks to ensure teams can quickly detect, investigate, and contain mobile device compromise.

    By implementing these measures, organizations can limit the potential blast radius of mobile compromises while building resilience.

    Editor’s note: This article originally appeared on our sister website, eSecurityPlanet.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    Implementing Post-Quantum Cryptography in Android

    March 27, 2026

    Coruna iOS exploit framework linked to Triangulation attacks

    March 26, 2026

    The Kill Chain Is Obsolete When Your AI Agent Is the Threat

    March 25, 2026

    ‘CanisterWorm’ Springs Wiper Attack Targeting Iran – Krebs on Security

    March 24, 2026

    A quick guide to recovering a hacked account

    March 23, 2026

    Fake ‘Trusted Sender’ Labels Misused in New Apple Mail Phishing Scheme

    March 22, 2026
    Top Posts

    Understanding U-Net Architecture in Deep Learning

    November 25, 202527 Views

    Hard-braking events as indicators of road segment crash risk

    January 14, 202624 Views

    The Complete Guide to Model Context Protocol

    October 29, 202516 Views
    Don't Miss

    Can your job be unbundled? If so it is under threat from AI – Computerworld

    March 27, 2026

    There have been plenty of warnings about job losses due to AI, particularly in the…

    Here’s why some people choose cryonics to store their bodies and brains after death

    March 27, 2026

    Maine bans online sweepstakes casino platforms statewide

    March 27, 2026

    Customize your AWS Management Console experience with visual settings including account color, region and service visibility

    March 27, 2026
    Stay In Touch
    • Facebook
    • Instagram
    About Us

    At GeekFence, we are a team of tech-enthusiasts, industry watchers and content creators who believe that technology isn’t just about gadgets—it’s about how innovation transforms our lives, work and society. We’ve come together to build a place where readers, thinkers and industry insiders can converge to explore what’s next in tech.

    Our Picks

    Can your job be unbundled? If so it is under threat from AI – Computerworld

    March 27, 2026

    Here’s why some people choose cryonics to store their bodies and brains after death

    March 27, 2026

    Subscribe to Updates

    Please enable JavaScript in your browser to complete this form.
    Loading
    • About Us
    • Contact Us
    • Disclaimer
    • Privacy Policy
    • Terms and Conditions
    © 2026 Geekfence.All Rigt Reserved.

    Type above and press Enter to search. Press Esc to cancel.