๐Ÿ‡ฆ๐Ÿ‡บStalecollected in 0m

Darksword Spyware Hits Millions of iPhones

Darksword Spyware Hits Millions of iPhones
PostLinkedIn
๐Ÿ‡ฆ๐Ÿ‡บRead original on iTNews Australia

๐Ÿ’กNew iPhone spyware threatโ€”secure your AI iOS deployments now.

โšก 30-Second TL;DR

What Changed

'Darksword' iPhone spyware uncovered

Why It Matters

Highlights iOS vulnerabilities, urging stronger device security for AI apps running on iPhones.

What To Do Next

Update iOS devices and scan for Darksword signatures using Apple's security tools.

Who should care:Researchers & Academics

๐Ÿง  Deep Insight

Web-grounded analysis with 8 cited sources.

๐Ÿ”‘ Enhanced Key Takeaways

  • โ€ขDarkSword targets iOS versions 18.4 through 18.7, using a hit-and-run technique to exfiltrate data like credentials, cryptocurrency wallets, and iCloud files before self-deleting.[1][2]
  • โ€ขAttributed to UNC6353, a suspected well-funded Russian threat actor with financial and espionage motives, who previously used the Coruna exploit kit.[2][4][5]
  • โ€ขDiscovered by Lookout Threat Labs in collaboration with Google Threat Intelligence Group and iVerify while investigating Coruna infrastructure.[1][3][4]

๐Ÿ› ๏ธ Technical Deep Dive

  • โ€ขLeverages six vulnerabilities including type confusion, use-after-free, out-of-bounds write, copy-on-write kernel bugs, and kernel privilege escalation, all previously fixed by Apple.[2][3]
  • โ€ขStarts with Safari/WebKit exploits (e.g., CVE-2025-43529 in JavaScriptCore DFG JIT), pivots via WebGPU/ANGLE out-of-bounds write for sandbox escape, then targets XNU kernel via AppleM2ScalerCSCDriver.[3][5]
  • โ€ขBypasses PAC and TPRO mitigations by abusing dyld structures and thread state manipulation; deploys payloads like GHOSTBLADE, GHOSTKNIFE, GHOSTSABER with full kernel privileges.[3][5]
  • โ€ขServer-side components show LLM-generated code with detailed comments, enabling modular extensibility in a high-level language despite poor OPSEC like un-obfuscated JavaScript.[2][4]

๐Ÿ”ฎ Future ImplicationsAI analysis grounded in cited sources

Apple-patched vulnerabilities reduce DarkSword's reach to <15% of iOS devices
iOS 18.7.3, 26.1-26.3 patches fixed all exploited flaws, limiting impact to unupdated devices running 18.4-18.7.[1][3][5]
Proliferation of exploit kits like DarkSword and Coruna signals shift to mass mobile attacks
Multiple actors including UNC6353 adopted DarkSword for watering hole campaigns, mirroring Coruna's spread amid rising mobile internet traffic.[4][5]
LLM-assisted development lowers barriers for state actors deploying iOS exploits
AI-generated code in DarkSword enables rapid module extension, allowing even less-experienced actors to maintain sophisticated platforms.[2][4]

โณ Timeline

2026-03
Lookout, Google, iVerify discover DarkSword while probing UNC6353's Coruna infrastructure
2026-03
Researchers publish joint analysis revealing hit-and-run infostealer targeting iOS 18.4-18.7
๐Ÿ“ฐ

Weekly AI Recap

Read this week's curated digest of top AI events โ†’

๐Ÿ‘‰Related Updates

AI-curated news aggregator. All content rights belong to original publishers.
Original source: iTNews Australia โ†—