Close Menu
TechTost
  • AI
  • Apps
  • Crypto
  • Fintech
  • Hardware
  • Media & Entertainment
  • Security
  • Startups
  • Transportation
  • Venture
  • Recommended Essentials
What's Hot

Ransomware dealer pleads guilty to helping ransomware gang

Amazon taps Sweden’s Einride for its electric big rigs

NSA Spies Reportedly Using Anthropic’s Mythos, Despite Pentagon Controversy

Facebook X (Twitter) Instagram
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer
Facebook X (Twitter) Instagram
TechTost
Subscribe Now
  • AI

    NSA Spies Reportedly Using Anthropic’s Mythos, Despite Pentagon Controversy

    21 April 2026

    It’s not just one thing – it’s another thing

    21 April 2026

    OpenAI takes aim at Anthropic with a boosted Codex that gives it more power on your desktop

    20 April 2026

    Existential Questions of OpenAI | TechCrunch

    20 April 2026

    ‘Tokenmaxxing’ makes developers less productive than they think

    19 April 2026
  • Apps

    GRAI believes that AI can make music more social, not replace artists

    21 April 2026

    WhatsApp is testing a premium subscription, but it’s mostly cosmetic

    21 April 2026

    Spotify is launching the ability to buy physical books in the US and the UK

    20 April 2026

    Fathom is adding a botless encounter mode in an attempt to counter Granola

    20 April 2026

    Anthropic launches Claude Design, a new product for creating fast graphics

    19 April 2026
  • Crypto

    British cryptographer Adam Back denies NYT report that he is Bitcoin creator Satoshi Nakamoto

    9 April 2026

    Hackers stole over $2.7 billion in crypto in 2025, data shows

    23 December 2025

    New report examines how David Sachs may benefit from Trump administration role

    1 December 2025

    Why Benchmark Made a Rare Crypto Bet on Trading App Fomo, with $17M Series A

    6 November 2025

    Solana co-founder Anatoly Yakovenko is a big fan of agentic coding

    30 October 2025
  • Fintech

    Once close enough for a takeover, Stripe and Airwallex are now going after each other

    18 April 2026

    Airwallex is set to take on Stripe and the rest of the payments industry — in the physical world

    16 April 2026

    Cash app launches ‘pay later’ feature for P2P transfers

    3 April 2026

    Doss raises $55 million for AI inventory management that connects to ERP

    24 March 2026

    Despite stiff competition, Kalshi, Polymarket CEOs back $35m VC fund projections

    23 March 2026
  • Hardware

    Who is John Ternus, the new CEO of Apple?

    21 April 2026

    Tim Cook steps down as Apple CEO, while John Ternus takes over

    21 April 2026

    Amazon Unveils Slimmer Fire TV Stick HD, Opens Ember Artline TVs for Pre-Order

    16 April 2026

    Motorola is suing social platforms and creators over posts raising concerns about speech in India

    16 April 2026

    AI data center startup Fluidstack is in talks for a $1 billion round at an $18 billion valuation months after raising $7.5 billion, report says

    15 April 2026
  • Media & Entertainment

    Deezer says 44% of songs uploaded to its platform every day are created with artificial intelligence

    20 April 2026

    Netflix plans to add a vertical video stream, use AI for recommendations

    17 April 2026

    Netflix co-founder and chairman Reed Hastings is stepping down from the board

    17 April 2026

    All we like is soulfulness

    16 April 2026

    Wait, could they still break up Live Nation?

    16 April 2026
  • Security

    Ransomware dealer pleads guilty to helping ransomware gang

    21 April 2026

    App host Vercel says it was hacked and customer data stolen

    21 April 2026

    Mastodon says its flagship server has been hit by a DDoS attack

    20 April 2026

    Palantir publishes mini-manifesto denouncing inclusion and ‘regressive’ cultures

    19 April 2026

    Bluesky confirms that a DDoS attack is the cause of the app’s ongoing outages

    18 April 2026
  • Startups

    You’ve heard of hybrid cars. Now meet a hybrid cement plant.

    19 April 2026

    Loop raises $95 million to build supply chain artificial intelligence that predicts disruptions

    18 April 2026

    Sources: Runner in talks to raise $2B+ at $50B valuation as business grows

    18 April 2026

    SaySo is a new short-form video app that aims to restore users’ trust in news

    17 April 2026

    From the Startup Battlefield to the International Space Station: geCKo Materials Made a Sticky Product

    17 April 2026
  • Transportation

    Amazon taps Sweden’s Einride for its electric big rigs

    21 April 2026

    The Rivian factory was hit by a tornado before the R2 was released

    20 April 2026

    TechCrunch Mobility: Uber enters the era of assetmaxxing

    20 April 2026

    Uber will now collect your returns from your doorstep

    17 April 2026

    Lucid Motors Appoints New CEO, Gets More Money From Uber, Saudis

    17 April 2026
  • Venture

    Anthropic rejects VC funding that values ​​it at $800B+, for now

    16 April 2026

    Financial risk management platform Pillar raises $20 million in rounds led by a16z

    15 April 2026

    Vercel CEO Guillermo Rauch signals IPO readiness as AI agents drive revenue

    14 April 2026

    Nvidia-backed SiFive hits $3.65 billion valuation for open AI chips

    11 April 2026

    How to make the Startup Battlefield Top 20 — and what each company gets regardless

    10 April 2026
  • Recommended Essentials
TechTost
You are at:Home»Security»Russians caught stealing personal data from Ukrainians with new advanced iPhone hacking tools
Security

Russians caught stealing personal data from Ukrainians with new advanced iPhone hacking tools

techtost.comBy techtost.com18 March 202604 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email
Russians Caught Stealing Personal Data From Ukrainians With New Advanced
Share
Facebook Twitter LinkedIn Pinterest Email

A group of hackers suspected of working at least in part for the Russian government has targeted iPhone users in Ukraine with a new set of hacking tools designed to steal their personal data, as well as potentially steal cryptocurrencies, according to cybersecurity researchers.

Researchers at Google and security companies iVerify and Stand-by analyzed new cyber attacks against Ukrainians launched by a group identified only as UNC6353. Investigators have examined compromised websites in a hacking campaign they say is related to one uncovered earlier this month. This most recent campaign used a hacking toolkit the companies called Darksword.

Darksword’s discovery, which follows that of a similar hacking toolkit, suggests that advanced, stealthy and powerful iPhone spyware may not be as rare as previously thought. Even then, Darksword only targeted users in Ukraine, implying some limitation on what could otherwise have been a wide-scale hacking campaign targeting users around the world.

In early March, Google revealed details of a sophisticated iPhone hacking toolkit called Coruna. The search giant said the tool was first used by a government client of a surveillance technology vendor, then by Russian spies targeting Ukrainians and finally by Chinese cybercriminals looking to steal cryptocurrency. As TechCrunch later revealed, the hacking toolkit was originally developed at US defense contractor L3Harris, specifically by its Trenchant hacking and surveillance technology division.

Coruna was originally designed for use by Western governments, particularly those parts of the so-called Five Eyes intelligence alliance, which consists of Australia, Canada, New Zealand, the United States and the United Kingdom, according to former L3Harris employees with knowledge of the company’s iPhone hacking tools.

Now, researchers said they have uncovered a related campaign using newer hacking tools that exploit different vulnerabilities.

The Darksword toolkit, according to researchers, was built to steal personal information such as passwords. photos; WhatsApp, Telegram and text messages. and browser history. Interestingly, Darksword was not designed for persistent tracking, but to infect victims, steal information, and disappear quickly.

Contact us

Do you have more information about Darksword, Coruna, or other government hacking and spyware tools? From a non-working device, Lorenzo Franceschi-Bicchierai can be reached securely on Signal at +1 917 257 1382 or via Telegram, Keybase and Wire @lorenzofb or via email.

“Darksword’s residence time on the device is likely to range from minutes, depending on the amount of data it discovers and penetrates,” Lookout researchers wrote.

For Rocky Cole, the co-founder of iVerify, the most likely explanation is that the hackers were interested in learning about the victims’ lifestyles, which did not require them to do constant surveillance, but rather a “smash-and-grab” operation.

Darksword was also designed to steal cryptocurrencies from popular wallet apps, which is unusual for a suspected government hacking group.

“This may indicate that this threat actor is financially motivated, or alternatively may indicate that this (potential) Russian state activity has expanded into financial theft targeting mobile devices,” Lookout wrote in its report.

However, Cole told TechCrunch, there is no evidence that the Russian hacking group is actually interested in stealing crypto, only that the malware could have been used to do so.

The malware was professionally developed to be modular and easy to add new features, which shows it was professionally designed, according to Lookout. Cole said he thinks it’s possible the same person who sold Coruna to the Russian government hacking group also sold Darksword.

As for who was behind Darksword, for Cole “all signs point to the Russian government,” while Lookout said it’s the same group that used Coruña against Ukrainians, also a suspected Russian government group.

“UNC6353 is a well-funded and connected threat actor that conducts attacks for financial gain and espionage aligned with Russian intelligence requirements,” Justin Albrecht, principal security researcher at Lookout, told TechCrunch. “We believe it can be argued that UNC6363 is potentially a Russian criminal proxy given the dual objectives of financial theft and intelligence gathering.”

As for the victims, Cole said the malware was designed to infect anyone visiting specific Ukrainian websites, as long as they were visiting from Ukraine, so it wasn’t a particularly targeted campaign.

Advanced apple caught cyber security cybercrime Dark word data espionage Google hacker Hacking iPhone Koruna personal Russia Russians Stealing tools Ukrainians Verify
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleH&M wants to make clothes out of CO2 using this startup’s technology
Next Article Patreon CEO calls AI companies’ fair use argument ‘bogus’, says creators should be paid
bhanuprakash.cg
techtost.com
  • Website

Related Posts

Ransomware dealer pleads guilty to helping ransomware gang

21 April 2026

NSA Spies Reportedly Using Anthropic’s Mythos, Despite Pentagon Controversy

21 April 2026

Who is John Ternus, the new CEO of Apple?

21 April 2026
Add A Comment

Leave A Reply Cancel Reply

Don't Miss

Ransomware dealer pleads guilty to helping ransomware gang

21 April 2026

Amazon taps Sweden’s Einride for its electric big rigs

21 April 2026

NSA Spies Reportedly Using Anthropic’s Mythos, Despite Pentagon Controversy

21 April 2026
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Fintech

Once close enough for a takeover, Stripe and Airwallex are now going after each other

18 April 2026

Airwallex is set to take on Stripe and the rest of the payments industry — in the physical world

16 April 2026

Cash app launches ‘pay later’ feature for P2P transfers

3 April 2026
Startups

You’ve heard of hybrid cars. Now meet a hybrid cement plant.

Loop raises $95 million to build supply chain artificial intelligence that predicts disruptions

Sources: Runner in talks to raise $2B+ at $50B valuation as business grows

© 2026 TechTost. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer

Type above and press Enter to search. Press Esc to cancel.