Close Menu
TechTost
  • AI
  • Apps
  • Crypto
  • Fintech
  • Hardware
  • Media & Entertainment
  • Security
  • Startups
  • Transportation
  • Venture
  • Recommended Essentials
What's Hot

AI assessment startup Braintrust confirms breach, tells each client to rotate sensitive keys

A 20-minute pitch wins Lachy Groom-backed Indian startup Pronto

Lucid Motors doesn’t know how many EVs it will build this year

Facebook X (Twitter) Instagram
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer
Facebook X (Twitter) Instagram
TechTost
Subscribe Now
  • AI

    Barry Diller trusts Sam Altman. But “trust is irrelevant” as AGI approaches, he says.

    7 May 2026

    Ethos Raises $22.75M From a16z For Its Experience Network With Voice Integration

    6 May 2026

    SAP bets $1.16 billion on 18-month-old German AI lab and says yes to NemoClaw

    6 May 2026

    ElevenLabs lists BlackRock, Jamie Foxx and Longoria as new investors

    5 May 2026

    OpenAI host Cerebras is on track for a major IPO

    5 May 2026
  • Apps

    Snap says $400M deal with Perplexity ‘ended amicably’

    7 May 2026

    Threads finally brings messaging to the web

    6 May 2026

    Bumble’s paying users are slipping as it bets on an overhaul later this year

    6 May 2026

    Meta will use artificial intelligence to analyze height and bone structure to detect whether users are underage

    5 May 2026

    Image AI models are now driving app development, surpassing chatbot upgrades

    5 May 2026
  • Crypto

    As crypto cools, a16z crypto raises $2.2 billion in capital

    6 May 2026

    Coinbase to lay off 14% of staff as part of broader restructuring

    5 May 2026

    British cryptographer Adam Back denies NYT report that he is Bitcoin creator Satoshi Nakamoto

    9 April 2026

    Hackers stole over $2.7 billion in crypto in 2025, data shows

    23 December 2025

    New report examines how David Sachs may benefit from Trump administration role

    1 December 2025
  • Fintech

    Robinhood’s venture fund IPO attracted 150,000+ private investors, CEO says

    7 May 2026

    PayPal says it’s “becoming a tech company again” — that’s AI

    6 May 2026

    Stripe introduces Link, a digital wallet that autonomous AI agents can also use

    1 May 2026

    Y Combinator alum Skio sells for $105 million in cash, raised only $8 million, founder says

    1 May 2026

    Amazon, Meta join the fight to end Google Pay and PhonePe’s dominance in India

    30 April 2026
  • Hardware

    Apple to pay $250 million to settle lawsuit over Siri’s lagging AI features

    7 May 2026

    reMarkable’s new Paper Pure tablet goes back to basics with a monochrome display

    6 May 2026

    Altara secures $7 million to bridge the data gap slowing the natural sciences

    6 May 2026

    This tiny, magnetic e-reader could keep you from doomscrolling

    4 May 2026

    Apple surprised by AI-driven demand for Macs

    1 May 2026
  • Media & Entertainment

    Netflix delays Greta Gerwig’s ‘Narnia’ for big theatrical push to 2027

    2 May 2026

    Roku’s $3 streaming service Howdy hits 1 million subscribers, per recent report

    29 April 2026

    Australia forces Big Tech companies to pay for news or face 2.25% tax.

    28 April 2026

    India’s app market is booming — but global platforms are raking in most of the profits

    23 April 2026

    YouTube extends its AI similarity detection technology to celebrities

    21 April 2026
  • Security

    AI assessment startup Braintrust confirms breach, tells each client to rotate sensitive keys

    7 May 2026

    DOJ says ransomware gang exploited Russian government databases

    6 May 2026

    Hackers steal student data during breach at education tech giant Instructure

    6 May 2026

    Kaspersky Suspects Chinese Hackers Put Backdoor in Daemon Tools in ‘Broad’ Attack

    5 May 2026

    The US government is warning of a serious CopyFail bug affecting major versions of Linux

    5 May 2026
  • Startups

    A 20-minute pitch wins Lachy Groom-backed Indian startup Pronto

    7 May 2026

    3 days left to lock in 50% off a second ticket to Disrupt 2026

    6 May 2026

    India’s first GenAI unicorn shifts to cloud services as AI model ambitions face reality

    5 May 2026

    FDA Approval, Fundraising and the Reality of Building Healthcare According to BioticsAI Founder

    1 May 2026

    Legal AI startup Legora hits $5.6 billion valuation, and its battle with Harvey just got hotter

    1 May 2026
  • Transportation

    Lucid Motors doesn’t know how many EVs it will build this year

    7 May 2026

    Aurora lands deal with McLane to run driverless truck routes in Texas

    6 May 2026

    Nuro gets driverless test license ahead of Uber’s robotaxi service launch

    6 May 2026

    Moment Energy raises $40M to meet ‘infinite energy demand’ with EV batteries

    5 May 2026

    Ouster’s new color lidar is coming to replace cameras

    4 May 2026
  • Venture

    All your M&A questions will be answered at Disrupt 2026

    6 May 2026

    ElevenLabs lists BlackRock, Jamie Foxx and Eva Longoria as new investors

    6 May 2026

    Get 50% off a second Disrupt 2026 pass to bid more, faster

    5 May 2026

    Nicolas Sauvage bets on the boring parts of AI

    4 May 2026

    Musely secures $360 million from General Catalyst without giving up equity

    2 May 2026
  • Recommended Essentials
TechTost
You are at:Home»Security»A major hacking tool has leaked online, putting millions of iPhones at risk. Here’s what you need to know.
Security

A major hacking tool has leaked online, putting millions of iPhones at risk. Here’s what you need to know.

techtost.comBy techtost.com27 March 202606 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email
A Major Hacking Tool Has Leaked Online, Putting Millions Of
Share
Facebook Twitter LinkedIn Pinterest Email

Security researchers have uncovered a series of cyberattacks targeting Apple customers around the world. The tools used in these hacking campaigns have been named Coruna and DarkSword and have been used by both government spies and cybercriminals to steal data from people’s iPhones and iPads.

It’s rare to see widespread hacks targeting iPhone and iPad users. In the past decade, the only precedents have been attacks against Muslim Uyghurs Chinaand against the people within Hong Kong.

Now, some of these powerful hacking tools have leaked online, potentially putting hundreds of millions of iPhones and iPads running out-of-date software at risk of data theft.

We break down what we know and don’t know about these latest iPhone and iPad hacking threats and what you can do to stay protected.

What is Coruna and DarkSword?

Coruna and DarkSword are two sets of advanced hacking tools that each contain a series of exploits capable of breaking into iPhones and iPads and stealing a person’s data, such as their messages, browser data, location history, and cryptocurrencies.

Security researchers who discovered the toolkits say Coruna’s exploits can hack iPhones and iPads running iOS 13 through iOS 17.2.1, which was released in December 2023.

DarkSword, however, contains exploits capable of hacking iPhones and iPads with newer devices running iOS 18.4 and 18.7, released in September 2025, according to Google security researchers investigating the code.

But the threat from DarkSword is more immediate to the general public. Someone leaked part of DarkSword and posted it on the code-sharing site GitHub, making it easy for anyone to download the malicious code and launch their own attacks targeting Apple users running older versions of iOS.

How do Coruna and DarkSword work?

These types of attacks are by definition stealthy and dangerous, as they can trap anyone who visits a specific website that hosts the malicious code.

Contact us

Do you have more information about DarkSword, Coruna, or other government hacking and spyware tools? From a non-working device, Lorenzo Franceschi-Bicchierai can be reached securely on Signal at +1 917 257 1382 or via Telegram, Keybase and Wire @lorenzofb or via email.

In some cases, victims can be compromised simply by visiting a legitimate website under the control of malicious hackers.

When victims are initially infected, Coruna and DarkSword exploit several vulnerabilities in iOS that allow hackers to essentially take complete control of the target’s device, allowing them to steal the individual’s personal data. The data is then uploaded to a web server run by the hackers.

At least some parts of the Coruna toolkit, as TechCrunch previously reported, were originally developed by Trenchant, a hacking and spyware unit within US defense contractor L3Harris that sells exploits to the US government and its top allies.

Kaspersky has also linked two exploits to the Coruna toolbox with Triangulation functiona sophisticated and possible government attack allegedly carried out against Russian iPhone users.

After Trenchant developed Coruna—somehow, it’s unclear how—those exploits found their way into the hands of Russian spies and Chinese cybercriminals, perhaps through one or more middlemen selling exploits on the underground market.

Coruna’s travels show again that powerful hacking tools, including those developed for the US under strict secrecy restrictions, can leak and proliferate out of control.

An example of this was in 2017 when an exploit developed by the US National Security Agency was leaked online that was capable of remotely hacking into Windows computers around the world. The same exploit was subsequently used in the devastating WannaCry ransomware attack, which hacked indiscriminately hundreds of thousands of computers around the world.

In the case of DarkSword, researchers observed attacks targeting users in China, Malaysia, Turkey, Saudi Arabia and Ukraine. It remains unclear who originally developed DarkSword, how it ended up in different hacking groups, or how the tools were leaked online.

It’s unclear who leaked and posted online on GitHub or why.

The hacking tools, seen by TechCrunch, are written in the web languages ​​HTML and JavaScript, making them relatively easy to set up and self-host anywhere by anyone looking to launch malicious attacks. (TechCrunch is not affiliated with GitHub as the tools can be used in malicious attacks.) Researchers posting on X have already tested the leaked tools by hacking into their own Apple devices running vulnerable versions of the company’s software.

DarkSword is now “essentially plug-and-play,” as Justin Albrecht, principal researcher at mobile security firm Lookout, explained to TechCrunch.

GitHub told TechCrunch that it has not removed the leaked code, but will keep it for security research.

“GitHub’s Acceptable Use Policies prohibit the publication of content that directly supports illegal active attacks or malware campaigns that cause technical damage,” GitHub’s web security advisor Jesse Geraci told TechCrunch. “However, we do not prohibit the publication of source code that could be used to develop malware or exploits, as the publication and distribution of such source code has educational value and provides a net benefit to the security community.”

Is my iPhone or iPad vulnerable to DarkSword?

If you have an iPhone or iPad that is out of date, you should consider updating immediately.

Apple told TechCrunch that users running the latest versions of iOS 15 through iOS 26 are already protected.

According to iVerification: “We strongly recommend updating to iOS 18.7.6 or iOS 26.3.1. This will mitigate all exploited vulnerabilities in these attack chains.”

According to Apple’s own statisticsnearly one in three iPhone and iPad users are still not running the latest iOS 26 software. This means there are potentially hundreds of millions of devices vulnerable to these hacking tools, since Apple advertises more than 2.5 billion active devices worldwide.

What if I can’t or don’t want to upgrade to iOS 26?

Apple also said that devices running Lockdown Mode, an additional security feature first introduced in iOS 16, also block these specific attacks.

Lockdown Mode is useful for journalists, dissidents, human rights activists, and anyone who believes they may be targeted for who they are or the work they do.

While Lockdown Mode isn’t perfect, there is no public evidence that hackers have so far been able to bypass its protections. (We’ve asked Apple if this claim still stands and will update if we hear back.) The lock feature was found to have prevented at least one attempt to install spyware on a human rights defender’s phone.

apple cyber security cybercrime Dark word evergreen Google hacker Hacking heres iOS iPhone iPhones Koruna leaked major millions online putting Risk Russia Stand-by tool Verify Zero-days
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleSilicon Valley’s two biggest dramas have crossed paths: LiteLLM and Delve
Next Article Netflix confirms it’s raising prices again
bhanuprakash.cg
techtost.com
  • Website

Related Posts

AI assessment startup Braintrust confirms breach, tells each client to rotate sensitive keys

7 May 2026

Apple to pay $250 million to settle lawsuit over Siri’s lagging AI features

7 May 2026

DOJ says ransomware gang exploited Russian government databases

6 May 2026
Add A Comment

Leave A Reply Cancel Reply

Don't Miss

AI assessment startup Braintrust confirms breach, tells each client to rotate sensitive keys

7 May 2026

A 20-minute pitch wins Lachy Groom-backed Indian startup Pronto

7 May 2026

Lucid Motors doesn’t know how many EVs it will build this year

7 May 2026
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Fintech

Robinhood’s venture fund IPO attracted 150,000+ private investors, CEO says

7 May 2026

PayPal says it’s “becoming a tech company again” — that’s AI

6 May 2026

Stripe introduces Link, a digital wallet that autonomous AI agents can also use

1 May 2026
Startups

A 20-minute pitch wins Lachy Groom-backed Indian startup Pronto

3 days left to lock in 50% off a second ticket to Disrupt 2026

India’s first GenAI unicorn shifts to cloud services as AI model ambitions face reality

© 2026 TechTost. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer

Type above and press Enter to search. Press Esc to cancel.