A suite of government hacking tools targeting iPhones is now being used by cybercriminals
Security researchers have identified a suite of powerful hacking tools capable of compromising iPhones running older software that they say has passed from a government customer into the hands of cybercriminals.
It found the same exploit kit months later targeting Ukrainian users in a broad-scale campaign by a Russian espionage group, and then later found it used by a financially motivated hacker in China.
The discovery also shows how exploits and back doors designed to be used by governments can leak and ultimately be abused by cybercriminals or other non-state actors. Mobile security company iVerify obtained and reverse-engineered the hacking tools, saying in a blog post that it linked the Coruna exploit kit to the U. government, based on similarities to hacking tools previously attributed to the United States.
“The more widespread the use, the more certain a leak will occur,” said iVerify.
“While iVerify has some evidence that this tool is a leaked US government framework, that shouldn’t overshadow the knowledge that these tools will find their way into the wild and will be used unscrupulously by bad actors.
According to Google, the Coruna kit can hack into an iPhone five separate ways by relying on and chaining together 23 separate vulnerabilities in its digital arsenal.
Affected devices range from iPhone models running iOS 13 up to 17.
1, which released in December 2023. According to Wired, which first reported the news, the Coruna kit contains components that were previously used in a hacking campaign dubbed Operation Triangulation.
While leaks of hacking tools are rare, they are not unheard of.
National Security Agency discovered that tools it had developed to hack into Windows computers worldwide had been stolen.
Logic Quality Breakdown:
- Updated_At:
- Truth_Blocks:
- Analysis_Method: