Tech

Apple Iphone: New Wild Tool Can Hack Hundreds of Millions — What We Learned

The revelation that a tool capable of seizing hundreds of millions of devices has appeared in the wild has renewed urgency for apple iphone users to update their software. Researchers at Google and cybersecurity firms iVerify and Lookout revealed on Wednesday (ET) that a technique nicknamed DarkSword, alongside a separate toolkit called Coruna, has been embedded in infected websites and used in broad, indiscriminate campaigns.

Why this matters right now

The stakes are immediate. DarkSword has been observed silently taking over iOS devices that visit compromised sites, and it works against phones running an earlier Apple operating system release noted to still account for close to a quarter of active devices. The research shows that these exploit kits have migrated from targeted espionage uses into forms that can be reused by multiple criminal groups, lowering the technical barrier to large-scale attacks on the apple iphone ecosystem.

Apple Iphone users urged to update: what defenses exist

Apple has emphasized software updates as the primary defense. Sarah O’Rourke, Apple spokesperson, said that keeping software current «remains the single most important thing users can do to maintain the high security of their Apple devices. » The company’s most recent operating system release was identified as protective against both DarkSword and Coruna, and a special update was issued for older hardware that cannot run the newest version, explicitly to block these intrusion tools.

Deep analysis: what lies beneath the headlines

DarkSword and Coruna are not simple, single-step attacks. The campaigns rely on watering hole compromises — legitimate-looking sites modified to deliver exploit code — that exploit how phones process web traffic. DarkSword, in particular, was found embedded in components of otherwise legitimate websites, including Ukrainian outlets and a government agency site, enabling the effortless harvest of visitor data. Researchers observed that one campaign left full, unobscured DarkSword code on the compromised sites, with English explanatory comments and the tool’s name, facilitating reuse by other actors.

Coruna has a distinct provenance: material tied to that toolkit originated from a commercial hacking toolset that was sold outside its original owner’s control, and it subsequently appeared in operations associated with state-linked actors. Both toolkits can grant deep remote access to victims’ phones, enabling the extraction of data ranging from messages and browser history to location and stored credentials, iVerify’s characterization.

Expert perspectives and regional impact

Security researchers warn the impact is already regional and widening. Rocky Cole, cofounder and CEO of iVerify, said, «A vast number of iOS users could have all of their personal data stolen simply for visiting a popular website. » Matthias Frielingsdorf, cofounder and researcher at iVerify, noted that careless exposure of exploit components makes it «really too easy» for other hackers to pick them up and reuse them.

John Scott-Railton, senior researcher at Citizen Lab, observed that the barrier to entry for destructive mobile attacks has been lowered and cautioned users that such attacks can be invisible to victims. The research traces infections and targeting across multiple countries: Ukrainians were targeted in espionage-linked campaigns; other incidents affected people in Saudi Arabia, Turkey, Malaysia, and customers tied to a Turkish security and surveillance firm. In some cases, Chinese cybercriminals and Russian intelligence-linked groups were identified as operators or adopters of these toolkits.

The consequences are both practical and strategic. On a practical level, device owners who have not updated their operating system remain exposed to automated compromise simply by visiting a compromised site. Strategically, the reuse and public exposure of the exploit code accelerates proliferation among nonstate criminal actors, broadening the pool of potential targets for apple iphone owners globally.

With the exploit chains observed to be complex but now packaged in reusable form, defenders face a window in which prompt, widespread patching can blunt the campaigns; failure to do so risks further spread and commoditization of these capabilities.

How many more compromised sites will appear before global patch uptake reaches a critical mass, and what new defensive practices will emerge to protect apple iphone users from future toolkits, remain open questions.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button