โš›๏ธStalecollected in 50m

DarkSword hacks millions of iPhones

DarkSword hacks millions of iPhones
PostLinkedIn
โš›๏ธRead original on Ars Technica

๐Ÿ’กNew Russian iPhone hack endangers mobile AI apps & user data security.

โšก 30-Second TL;DR

What Changed

DarkSword hacking technique discovered in active use

Why It Matters

This vulnerability exposes iPhone users to remote hacks, risking data theft and privacy breaches. AI developers building iOS apps must prioritize security audits. It highlights ongoing mobile threats in big tech ecosystems.

What To Do Next

Audit iOS AI apps with Xcode Security Analysis tool for emerging threats like DarkSword.

Who should care:Developers & AI Engineers

๐Ÿง  Deep Insight

Web-grounded analysis with 6 cited sources.

๐Ÿ”‘ Enhanced Key Takeaways

  • โ€ขDarkSword exploits six vulnerabilities in iOS 18.4 to 18.6.2, including three zero-days in Safari, WebGPU, and the iOS kernel (CVE-2025-43520), enabling full device compromise via a malicious website.[1][2][3]
  • โ€ขIt employs a 'hit-and-run' fileless technique, hijacking legitimate system processes like WebContent, GPU process, and mediaplaybackd to exfiltrate data such as crypto wallets, iMessage, WhatsApp, and Apple Health records within minutes before self-cleaning.[1][2][5]
  • โ€ขDiscovered by Lookout, Google, and iVerify through analysis of UNC6353 infrastructure; the modular JavaScript-based kit supports rapid development and was ported from iOS 17 exploits, with C2 servers using ECDH/AES-encrypted HTTP.[2][3][5]

๐Ÿ› ๏ธ Technical Deep Dive

  • โ€ขInitiates with malicious iFrame on compromised sites loading JavaScript to fingerprint devices and deliver exploits targeting Safari/WebGPU for sandbox escape.
  • โ€ขUses out-of-bounds write in ANGLE (GPU process) and Pointer Authentication Codes (PAC) bypass for arbitrary read/write and function call primitives.
  • โ€ขEscalates via Copy-On-Write vulnerability in AppleM2ScalerCSCDriver (XNU kernel) to mediaplaybackd daemon through XPC interfaces.
  • โ€ขExfiltrates from specific paths like /private/var/mobile/Library/SMS/sms.db (iMessage), WhatsApp databases (e.g., ChatStorage.sqlite), and Telegram AppGroup containers.
  • โ€ขEmploys custom binary protocol over HTTP with ECDH and AES encryption for C2 communication; cleanup erases staged files post-exfiltration.

๐Ÿ”ฎ Future ImplicationsAI analysis grounded in cited sources

Apple will patch remaining DarkSword vectors in iOS 26.4
Patches for underlying bugs were incrementally released in iOS 26.1-26.3, with ongoing updates advised for full mitigation.[2][5]
Adoption of Lockdown Mode will rise among high-risk users
Google and researchers recommend it as immediate defense against DarkSword's zero-click web exploits.[4]
Russian APT UNC6353 will evolve DarkSword for newer iOS versions
Kit's modular design and prior port from iOS 17 indicate capacity for rapid adaptation beyond patched versions.[2][3]

โณ Timeline

2026-02
Google discloses Coruna exploit kit used by Russian UNC6353 against iOS 13-17, patched by Apple.
2026-03
iVerify recovers complete DarkSword exploit kit shortly after Coruna publication, targeting iOS 18.4-18.6.2.
2026-03
Lookout, Google, and iVerify jointly uncover DarkSword via UNC6353 infrastructure analysis.
๐Ÿ“ฐ

Weekly AI Recap

Read this week's curated digest of top AI events โ†’

๐Ÿ‘‰Related Updates

AI-curated news aggregator. All content rights belong to original publishers.
Original source: Ars Technica โ†—