Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Zero‑Day Attacks on Enterprise Software Reach Record High

March 6, 2026

Google Disrupts UNC2814 GRIDTIDE Campaign After 53 Breaches Across 42 Countries

March 6, 2026

SLH Offers $500–$1,000 Per Call to Recruit Women for IT Help Desk Vishing Attacks

March 6, 2026
Facebook X (Twitter) Instagram
Friday, March 6
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Coruna Exploit Kit Targets Older iPhones in Multi-Stage Campaigns
News

Coruna Exploit Kit Targets Older iPhones in Multi-Stage Campaigns

Team-CWDBy Team-CWDMarch 5, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A sophisticated exploit kit capable of compromising Apple iPhones running iOS versions 13.0 through 17.2.1 has been uncovered by cybersecurity researchers.

Google’s Threat Intelligence Group (GTIG) said the toolkit, internally named Coruna, includes 5 full exploit chains and 23 vulnerabilities designed to infiltrate devices and extract sensitive financial data.

The newly identified toolkit is among the most comprehensive collections of iOS exploits observed in the wild. GTIG said several of the techniques rely on previously unseen exploitation methods and mitigation bypasses.

Initially observed in early 2025, the toolkit was first linked to a customer of a commercial surveillance vendor. Later in the year, investigators tracked its use in highly targeted attacks against Ukrainian users, attributed to a suspected Russian espionage group known as UNC6353.

What the Coruna Exploit Kit Does

By late 2025, the same exploit framework appeared again in broader campaigns tied to a financially motivated actor operating from China, tracked as UNC6691. In that case, the exploits were distributed through fake financial and cryptocurrency websites designed to lure victims into visiting the pages with an iPhone.

The websites injected a hidden frame that silently delivered the exploit kit once an iOS device accessed the page. Researchers recovered hundreds of samples of the toolkit during this phase of the investigation.

GTIG said the exploit chains target a wide range of Apple devices and system versions, combining multiple vulnerabilities to gain deeper access to the operating system.

Read more on iPhone cybersecurity threats: iOS 18.3.2 Patches Actively Exploited WebKit Vulnerability

The framework surrounding the exploits is highly engineered. It first profiles a visitor’s device to determine the iPhone model and iOS version before selecting the correct exploit chain.

Key characteristics of the exploit kit include:

  • Device fingerprinting to identify specific iPhone models and software versions

  • Automatic selection of compatible WebKit vulnerabilities

  • Techniques designed to bypass Apple security protections, such as pointer authentication

  • Custom encryption and compression methods used to deliver payloads

The researchers also observed a binary loader that deploys the final stage of the attack after the initial browser exploit succeeds.

Financial Data Theft Capabilities

Once the exploit chain completes, a loader referred to as PlasmaLoader installs itself within a system process on the device. Instead of traditional surveillance features, the payload focuses on financial data collection.

It can scan stored images for QR codes and search text files for cryptocurrency wallet recovery phrases or keywords such as “backup phrase” or “bank account”. If detected, the information is transmitted to attacker-controlled servers.

Google said the exploit kit is ineffective against the latest iOS versions. The company has added related malicious domains to Safe Browsing and recommends users update their devices to the newest software release or enable Lockdown Mode where updates are not possible.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleMalicious NuGet Packages Stole ASP.NET Data; npm Package Dropped Malware
Next Article Zero-Click FreeScout Bug Enables Remote Code Execution
Team-CWD
  • Website

Related Posts

News

Zero‑Day Attacks on Enterprise Software Reach Record High

March 6, 2026
News

Google Disrupts UNC2814 GRIDTIDE Campaign After 53 Breaches Across 42 Countries

March 6, 2026
News

SLH Offers $500–$1,000 Per Call to Recruit Women for IT Help Desk Vishing Attacks

March 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

What’s at stake if your employees post too much online

December 1, 2025

Is Poshmark safe? How to buy and sell without getting scammed

February 19, 2026

What parents should know to protect their children from doxxing

November 28, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.