A major hacking tool has leaked online, putting millions of iPhones at risk. Here’s what you need to know.
Security researchers have uncovered a series of cyberattacks targeting Apple customers across the world.
It’s rare to see widespread hacks targeting iPhone and iPad users. In the last decade, the only precedents have been attacks against Uyghurs Muslims in China, and against people in Hong Kong.
We are breaking down what we know and what we don’t about these latest iPhone and iPad hacking threats, and what you can do to stay protected. What are Coruna and DarkSword?
1, which was released in December 2023.
7, released in September 2025, according to security researchers with Google who are investigating the code. But the threat from DarkSword is more immediate to the general public. Someone leaked part of DarkSword and published it on code-sharing site GitHub, making it easy for anyone to download the malicious code and launch their own attacks targeting Apple users running older versions of iOS. How do Coruna and DarkSword work?
In some cases, victims can be hacked simply by visiting a legitimate website under the control of malicious hackers.
The data is then uploaded to a web server run by the hackers.
Kaspersky has also linked two exploits in Coruna’s toolkit to Operation Triangulation, a complex and likely government-led cyberattack allegedly carried out against Russian iPhone users. After Trenchant developed Coruna — somehow, it’s not clear how — these exploits found their way into the hands of Russian spies and Chinese cybercriminals, perhaps through one or several intermediaries who sell exploits on the underground market. Coruna’s travels show again that powerful hacking tools, including those developed for the U. under tight secrecy restrictions, can leak and proliferate out of control.
One example of this was in 2017 when an exploit developed by the U.
National Security Agency, which was capable of remotely breaking into Windows computers around the world, leaked online.
In the case of DarkSword, researchers have observed attacks targeting users in China, Malaysia, Turkey, Saudi Arabia, and Ukraine.
It’s unclear who leaked and published online to GitHub, or for what reason.
(TechCrunch is not linking to GitHub as the tools can be used in malicious attacks. ) Researchers posting on X have already tested the leaked tools by hacking into their own Apple devices running vulnerable versions of the company’s software.
“GitHub’s Acceptable Use Policies prohibit posting content that directly supports unlawful active attack or malware campaigns that are causing technical harms,” GitHub’s online safety counsel Jesse Geraci told TechCrunch. “However, we do not prohibit the posting of source code which could be used to develop malware or exploits, as the publication and distribution of such source code has educational value and provides a net benefit to the security community. ” Is my iPhone or iPad vulnerable to DarkSword?
If you have an iPhone or iPad that is not up to date, you should consider updating immediately.
According to iVerify: “We strongly recommend updating to iOS 18. This will mitigate all vulnerabilities that have been exploited in these attack chains. ” According to Apple’s own statistics, almost one-in-three iPhone and iPad users are still not running the latest iOS 26 software.
5 billion active devices around the world. What if I can’t or don’t want to upgrade to iOS 26?
Logic Quality Breakdown:
- Updated_At:
- Truth_Blocks:
- Analysis_Method: