Hackers leverage leaked government intelligence tools to target everyday iOS users | Kaspersky official blog
DarkSword and Coruna are new iOS malware strains that infect devices through zero-click attacks. Learn how these threats operate, which iOS versions are at risk, and how to protect your devices.
AI Analysis
Technical Summary
DarkSword and Coruna are sophisticated iOS malware strains leveraging zero-click infection techniques via malicious code injected into legitimate websites. DarkSword targets iOS 18 and older versions, exploiting a chain of six vulnerabilities to escape sandbox and escalate privileges, while Coruna targets iOS 13 through 17.2.1 using 23 vulnerabilities primarily in WebKit. Both malware strains operate filelessly in RAM and harvest a wide range of sensitive data including messaging app content, browser history, calendar, notes, health data, and crypto-wallet credentials. These tools were originally developed by state-affiliated entities and leaked to cybercriminal groups, enabling mass infections of everyday users rather than only high-profile targets. The malware does not persist after reboot. Apple has issued patches across multiple iOS versions, including older ones, and recommends enabling Background Security Improvements and Lockdown Mode to reduce risk.
Potential Impact
The malware enables attackers to silently compromise iOS devices without user interaction, leading to theft of sensitive personal data and cryptocurrency. The infection affects a broad user base, including everyday users, not just high-risk individuals. The fileless nature means the malware resides only in RAM and disappears after reboot, complicating detection and persistence. The widespread leak and availability of source code increase the risk of further adaptations by other threat actors. Infection has been confirmed in multiple countries including China, Saudi Arabia, Turkey, and Malaysia.
Mitigation Recommendations
Apple has released official patches addressing the vulnerabilities exploited by DarkSword and Coruna across iOS versions 13 through 18, including updates 15.8.7, 16.7.15, and 18.7.7. Users should promptly update their devices to the latest available iOS or iPadOS version. Enabling Background Security Improvements allows critical security fixes to be installed automatically, reducing exposure windows. Activating Lockdown Mode can further limit attack vectors by restricting device features. Regularly rebooting devices will remove fileless malware residing in memory. Storing sensitive data such as crypto wallet keys in encrypted vaults is recommended. Following these steps will mitigate the risk of infection and data compromise.
Affected Countries
China, Saudi Arabia, Turkey, Malaysia
Hackers leverage leaked government intelligence tools to target everyday iOS users | Kaspersky official blog
Description
DarkSword and Coruna are new iOS malware strains that infect devices through zero-click attacks. Learn how these threats operate, which iOS versions are at risk, and how to protect your devices.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
DarkSword and Coruna are sophisticated iOS malware strains leveraging zero-click infection techniques via malicious code injected into legitimate websites. DarkSword targets iOS 18 and older versions, exploiting a chain of six vulnerabilities to escape sandbox and escalate privileges, while Coruna targets iOS 13 through 17.2.1 using 23 vulnerabilities primarily in WebKit. Both malware strains operate filelessly in RAM and harvest a wide range of sensitive data including messaging app content, browser history, calendar, notes, health data, and crypto-wallet credentials. These tools were originally developed by state-affiliated entities and leaked to cybercriminal groups, enabling mass infections of everyday users rather than only high-profile targets. The malware does not persist after reboot. Apple has issued patches across multiple iOS versions, including older ones, and recommends enabling Background Security Improvements and Lockdown Mode to reduce risk.
Potential Impact
The malware enables attackers to silently compromise iOS devices without user interaction, leading to theft of sensitive personal data and cryptocurrency. The infection affects a broad user base, including everyday users, not just high-risk individuals. The fileless nature means the malware resides only in RAM and disappears after reboot, complicating detection and persistence. The widespread leak and availability of source code increase the risk of further adaptations by other threat actors. Infection has been confirmed in multiple countries including China, Saudi Arabia, Turkey, and Malaysia.
Mitigation Recommendations
Apple has released official patches addressing the vulnerabilities exploited by DarkSword and Coruna across iOS versions 13 through 18, including updates 15.8.7, 16.7.15, and 18.7.7. Users should promptly update their devices to the latest available iOS or iPadOS version. Enabling Background Security Improvements allows critical security fixes to be installed automatically, reducing exposure windows. Activating Lockdown Mode can further limit attack vectors by restricting device features. Regularly rebooting devices will remove fileless malware residing in memory. Storing sensitive data such as crypto wallet keys in encrypted vaults is recommended. Following these steps will mitigate the risk of infection and data compromise.
Affected Countries
Technical Details
- Article Source
- {"url":"https://www.kaspersky.com/blog/ios-exploits-darksword-and-coruna-in-mass-attacks/55622/","fetched":true,"fetchedAt":"2026-04-17T13:17:04.082Z","wordCount":1881}
Threat ID: 69e232d082d89c981ff8363c
Added to database: 4/17/2026, 1:17:04 PM
Last enriched: 4/17/2026, 1:17:11 PM
Last updated: 4/17/2026, 7:02:41 PM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.