DarkSword hacks millions of iPhones

๐กNew Russian iPhone hack endangers mobile AI apps & user data security.
โก 30-Second TL;DR
What Changed
DarkSword hacking technique discovered in active use
Why It Matters
This vulnerability exposes iPhone users to remote hacks, risking data theft and privacy breaches. AI developers building iOS apps must prioritize security audits. It highlights ongoing mobile threats in big tech ecosystems.
What To Do Next
Audit iOS AI apps with Xcode Security Analysis tool for emerging threats like DarkSword.
๐ง Deep Insight
Web-grounded analysis with 6 cited sources.
๐ Enhanced Key Takeaways
- โขDarkSword exploits six vulnerabilities in iOS 18.4 to 18.6.2, including three zero-days in Safari, WebGPU, and the iOS kernel (CVE-2025-43520), enabling full device compromise via a malicious website.[1][2][3]
- โขIt employs a 'hit-and-run' fileless technique, hijacking legitimate system processes like WebContent, GPU process, and mediaplaybackd to exfiltrate data such as crypto wallets, iMessage, WhatsApp, and Apple Health records within minutes before self-cleaning.[1][2][5]
- โขDiscovered by Lookout, Google, and iVerify through analysis of UNC6353 infrastructure; the modular JavaScript-based kit supports rapid development and was ported from iOS 17 exploits, with C2 servers using ECDH/AES-encrypted HTTP.[2][3][5]
๐ ๏ธ Technical Deep Dive
- โขInitiates with malicious iFrame on compromised sites loading JavaScript to fingerprint devices and deliver exploits targeting Safari/WebGPU for sandbox escape.
- โขUses out-of-bounds write in ANGLE (GPU process) and Pointer Authentication Codes (PAC) bypass for arbitrary read/write and function call primitives.
- โขEscalates via Copy-On-Write vulnerability in AppleM2ScalerCSCDriver (XNU kernel) to mediaplaybackd daemon through XPC interfaces.
- โขExfiltrates from specific paths like /private/var/mobile/Library/SMS/sms.db (iMessage), WhatsApp databases (e.g., ChatStorage.sqlite), and Telegram AppGroup containers.
- โขEmploys custom binary protocol over HTTP with ECDH and AES encryption for C2 communication; cleanup erases staged files post-exfiltration.
๐ฎ Future ImplicationsAI analysis grounded in cited sources
โณ Timeline
๐ Sources (6)
Factual claims are grounded in the sources below. Forward-looking analysis is AI-generated interpretation.
- cultofmac.com โ Darksword Iphone Hacking Tool
- lookout.com โ Lookout Uncovers Darksword Ios Exploit Chain
- thehackernews.com โ Darksword Ios Exploit Kit Uses 6 Flaws
- siliconangle.com โ Researchers Discover Zero Day Darksword Exploit Chain Ios 18
- iverify.io โ Darksword Ios Exploit Kit Explained
- securityweek.com โ Darksword Ios Exploit Kit Used by State Sponsored Hackers Spyware Vendors
Weekly AI Recap
Read this week's curated digest of top AI events โ
๐Related Updates
AI-curated news aggregator. All content rights belong to original publishers.
Original source: Ars Technica โ