{"id":227727,"date":"2026-03-10T17:44:22","date_gmt":"2026-03-10T17:44:22","guid":{"rendered":"https:\/\/entertainment.runfyers.com\/index.php\/2026\/03\/10\/the-mystery-of-a-globetrotting-iphone-hacking-toolkit-2\/"},"modified":"2026-03-10T17:44:22","modified_gmt":"2026-03-10T17:44:22","slug":"the-mystery-of-a-globetrotting-iphone-hacking-toolkit-2","status":"publish","type":"post","link":"https:\/\/entertainment.runfyers.com\/index.php\/2026\/03\/10\/the-mystery-of-a-globetrotting-iphone-hacking-toolkit-2\/","title":{"rendered":"The mystery of a globetrotting iPhone-hacking toolkit"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p id=\"speakable-summary\" class=\"wp-block-paragraph\">A mass hacking campaign targeting iPhone users in Ukraine and China used tools that were likely designed by U.S. military contractor L3Harris, TechCrunch has learned. The tools, which were intended for Western spies, wound up in the hands of various hacking groups, including Russian government spooks and Chinese cybercriminals.<\/p>\n<p class=\"wp-block-paragraph\">Last week, Google revealed that over the course of 2025, it discovered that <a href=\"https:\/\/techcrunch.com\/2026\/03\/03\/a-suite-of-government-hacking-tools-targeting-iphones-is-now-being-used-by-cybercriminals\/\" target=\"_blank\" rel=\"noreferrer noopener\">a sophisticated iPhone-hacking toolkit<\/a> had been used in a series of global attacks. The toolkit, dubbed \u201cCoruna\u201d by its original developer, was made of 23 different components first used \u201cin highly targeted operations\u201d by an unnamed government customer of an unspecified \u201csurveillance vendor.\u201d It was then used by Russian government spies against a limited number of Ukrainians and finally by Chinese cybercriminals \u201cin broad-scale\u201d campaigns with the goal of stealing money and cryptocurrency.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">Researchers at mobile cybersecurity company iVerify, which <a href=\"https:\/\/iverify.io\/blog\/coruna-inside-the-nation-state-grade-ios-exploit-kit-we-ve-been-tracking\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">independently analyzed Coruna<\/a>, said they believed it may have been originally built by a company that sold it to the U.S. government.<\/p>\n<p class=\"wp-block-paragraph\">Two former employees of government contractor L3Harris told TechCrunch that Coruna was, at least in part, developed by the company\u2019s hacking and surveillance tech division, Trenchant. The two former employees both had knowledge of the company\u2019s iPhone hacking tools.\u00a0Both spoke on condition of anonymity because they weren\u2019t authorized to talk about their work for the company.<\/p>\n<p class=\"wp-block-paragraph\">\u201cCoruna was definitely an internal name of a component,\u201d said one former L3Harris employee, who was familiar with iPhone hacking tools as part of their work at Trenchant.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">\u201cLooking at the technical details,\u201d this person said, referring to some of the evidence Google published, \u201cso many are familiar.\u201d\u00a0<\/p>\n<div class=\"article-block block--callout block--right has-green-500-background-color\">\n<h4 class=\"block--callout__title\">Contact Us<\/h4>\n<p>\t\t\tDo you have more information about Coruna, or other government hacking and spyware tools? From a non-work device, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram, Keybase and Wire @lorenzofb, or <a href=\"https:\/\/techcrunch.com\/2026\/03\/10\/us-military-contractor-likely-built-iphone-hacking-tools-used-by-russian-spies-in-ukraine\/mailto:lorenzo@techcrunch.com\/\" target=\"_blank\" rel=\"noopener\">by email<\/a><a href=\"https:\/\/techcrunch.com\/2026\/03\/10\/us-military-contractor-likely-built-iphone-hacking-tools-used-by-russian-spies-in-ukraine\/mailto:lorenzo@techcrunch.com\/\" target=\"_blank\" rel=\"noopener\">.<\/a> \t\t<\/div>\n<p class=\"wp-block-paragraph\">The former employee said the overarching Trenchant toolkit housed several different components, including Coruna and related exploits. Another former employee confirmed that some of the details included in the published hacking toolkit came from Trenchant.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">L3Harris sells Trenchant\u2019s hacking and surveillance tools exclusively to the U.S. government and its allies in the so-called Five Eyes intelligence alliance, which includes Australia, Canada, New Zealand, and the United Kingdom. Given Trenchant\u2019s limited number of customers, it\u2019s possible that Coruna was originally acquired and used by one of these governments\u2019 intelligence agencies before falling into unintended hands, though it\u2019s unclear how much of the published Coruna hacking toolkit were developed by L3Harris Trenchant.<\/p>\n<p class=\"wp-block-paragraph\">An L3Harris spokesperson did not respond to a request for comment.<\/p>\n<p class=\"wp-block-paragraph\">How Coruna went from the hands of a Five Eyes government contractor to a Russian government hacking group and then to a Chinese cybercrime gang is unclear.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">But some of the circumstances appear similar to the case of <a href=\"https:\/\/techcrunch.com\/2026\/02\/25\/inside-the-story-of-the-us-defense-contractor-who-leaked-hacking-tools-to-russia\/\" target=\"_blank\" rel=\"noreferrer noopener\">Peter Williams<\/a>, a former general manager at Trenchant. From 2022 until he resigned in mid-2025, <a href=\"https:\/\/techcrunch.com\/2025\/10\/23\/u-s-government-accuses-former-l3harris-cyber-boss-of-stealing-trade-secrets\/\" target=\"_blank\" rel=\"noreferrer noopener\">Williams sold eight company hacking tools<\/a> to Operation Zero, a Russian company that <a href=\"https:\/\/techcrunch.com\/2023\/09\/27\/russian-zero-day-seller-offers-20m-for-hacking-android-and-iphones\/\" target=\"_blank\" rel=\"noopener\">offers millions of dollars<\/a> in exchange for <a href=\"https:\/\/techcrunch.com\/2025\/04\/25\/techcrunch-reference-guide-to-security-terminology\/#zero-day\" target=\"_blank\" rel=\"noreferrer noopener\">zero-day<\/a> exploits, meaning vulnerabilities that are unknown to the affected vendor.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">Williams, a 39-year-old Australian citizen, <a href=\"https:\/\/techcrunch.com\/2026\/02\/24\/former-l3harris-trenchant-boss-jailed-for-selling-hacking-tools-to-russian-broker\/\" target=\"_blank\" rel=\"noreferrer noopener\">was sentenced to seven years in prison<\/a> last month, after he admitted to stealing and selling the eight Trenchant hacking tools to Operation Zero for $1.3 million.\u00a0\u00a0<\/p>\n<p class=\"wp-block-paragraph\">The U.S. government said Williams, who <a href=\"https:\/\/techcrunch.com\/2025\/11\/03\/how-an-ex-l3-harris-trenchant-boss-stole-and-sold-cyber-exploits-to-russia\/\" target=\"_blank\" rel=\"noreferrer noopener\">took advantage of having \u201cfull access\u201d<\/a> to Trenchant\u2019s networks, \u201cbetrayed\u201d the United States and its allies. Prosecutors <a href=\"https:\/\/techcrunch.com\/2026\/02\/11\/doj-says-trenchant-boss-sold-exploits-to-russian-broker-capable-of-accessing-millions-of-computers-and-devices\/\" target=\"_blank\" rel=\"noreferrer noopener\">accused him of leaking tools<\/a> that could have allowed whoever used them to \u201cpotentially access millions of computers and devices around the world,\u201d suggesting the tools relied on vulnerabilities affecting widely used software like iOS.\u00a0\u00a0<\/p>\n<p class=\"wp-block-paragraph\">Operation Zero, which <a href=\"https:\/\/techcrunch.com\/2026\/02\/24\/treasury-sanctions-russian-zero-day-broker-accused-of-buying-exploits-stolen-from-u-s-defense-contractor\/\" target=\"_blank\" rel=\"noreferrer noopener\">was sanctioned by the U.S. government<\/a> last month, claims to work exclusively with the Russian government and local companies. The U.S Treasury claimed that the Russian broker sold Williams\u2019 \u201cstolen tools to at least one unauthorized user.\u201d<\/p>\n<p class=\"wp-block-paragraph\">That would explain how the Russian espionage group, which Google has only identified as UNC6353, acquired Coruna and deployed it on compromised Ukrainian websites so that it would hack certain iPhone users from a specific geolocation who unwittingly visited the malicious site.<\/p>\n<p class=\"wp-block-paragraph\">It is possible that once Operation Zero acquired Coruna and potentially sold it to the Russian government, the broker then resold the toolkit to someone else, perhaps another broker, another country, or even directly to cybercriminals. The Treasury alleged that a member of the Trickbot ransomware gang worked with Operation Zero, tying the broker to financially motivated hackers.<\/p>\n<p class=\"wp-block-paragraph\">At that point, Coruna may have passed to other hands until it reached Chinese hackers. According to U.S. prosecutors, Williams recognized code that he wrote and sold to Operation Zero later being used by a South Korean broker.<\/p>\n<figure class=\"wp-block-image size-large\"><figcaption class=\"wp-element-caption\"><span class=\"wp-element-caption__text\">the logo Kaspersky made for Operation Triangulation next to the L3Harris logo.<\/span><span class=\"wp-block-image__credits\"><strong>Image Credits:<\/strong>Kaspersky and L3Harris<\/span><\/figcaption><\/figure>\n<h2 class=\"wp-block-heading\">Operation Triangulation<\/h2>\n<p class=\"wp-block-paragraph\">Google researchers wrote on Tuesday that two specific Coruna exploits and underlying vulnerabilities, called Photon and Gallium by their original developers, were used as zero-days in Operation Triangulation, a sophisticated hacking campaign allegedly used against Russian iPhone users. Operation Triangulation was <a href=\"https:\/\/techcrunch.com\/2023\/06\/01\/kaspersky-says-attackers-hacked-staff-iphones-with-unknown-malware\/\" target=\"_blank\" rel=\"noreferrer noopener\">first revealed<\/a> by Kaspersky in 2023.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">Rocky Cole, the co-founder of iVerify, told TechCrunch that \u201cthe best explanation based on what\u2019s known right now\u201d points to Trenchant and the U.S. government being the original developers and customers of Coruna. Although, Cole added, he isn\u2019t claiming this \u201cdefinitively.\u201d<\/p>\n<p class=\"wp-block-paragraph\">That assessment, he said, is based on three factors. The timeline of Coruna\u2019s use lines up with Williams\u2019 leaks; the structure of three modules \u2014 Plasma, Photon, and Gallium \u2014 found in Coruna bear strong similarities with Triangulation; and Coruna reused some of the same exploits used in that operation.<\/p>\n<p class=\"wp-block-paragraph\">According to Cole, \u201cpeople close to the defense community\u201d claim Plasma was used in Operation Triangulation, \u201calthough there\u2019s no public evidence of that.\u201d (Cole previously worked at the U.S. National Security Agency.)<\/p>\n<p class=\"wp-block-paragraph\">According to Google and iVerify, Coruna was designed to hack iPhone models running iOS 13 through 17.2.1, released between September 2019 and December 2023. Those dates line up with the timeline of some of Williams\u2019 leaks and the discovery of Operation Triangulation.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">One of the former Trenchant employees told TechCrunch that when Triangulation was first revealed in 2023, other employees at the company believed that at least one of the zero-days caught by Kaspersky \u201cwere from us, and potentially \u2018ripped out\u2019 of\u201d the overarching project that included Coruna.<\/p>\n<p class=\"wp-block-paragraph\">Another breadcrumb that points to Trenchant \u2014 <a href=\"http:\/\/x.com\/craiu\/status\/2030019866963390962\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">as security researcher Costin Raiu noted<\/a> \u2014 is the use of bird names for some of the 23 tools, such as Cassowary, Terrorbird, Bluebird, Jacurutu, and Sparrow. In 2021, <a href=\"http:\/\/washingtonpost.com\/technology\/2021\/04\/14\/azimuth-san-bernardino-apple-iphone-fbi\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">The Washington Post revealed<\/a> that Azimuth, <a href=\"https:\/\/www.vice.com\/en\/article\/iphone-zero-days-inside-azimuth-security\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">one of the two startups<\/a> later acquired by L3Harris and <a href=\"https:\/\/www.l3harris.com\/all-capabilities\/trenchant#:~:text=Trenchant%E2%80%99s%20expertise%20is%20the%20byproduct%20of%20the%20L3Harris%20acquisition%20of%20two%20highly%2Dregarded%20information%20security%20businesses%20%E2%80%93%20Azimuth%20Security%20and%20Linchpin%20Labs.\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">merged into Trenchant<\/a>, had sold a hacking tool called Condor to the FBI <a href=\"https:\/\/www.vice.com\/en\/article\/azimuth-security-san-bernardino-iphone\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">in the infamous San Bernardino iPhone cracking case<\/a>.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">After Kaspersky published its research on Operation Triangulation, Russia\u2019s Federal Security Service (FSB) accused the NSA of hacking \u201cthousands\u201d of iPhones in Russia, targeting diplomats in particular. A Kaspersky spokesperson said at the time that the company did not have information on the FSB\u2019s claims. The spokesperson did note that \u201cindicators of compromise\u201d \u2014 meaning evidence of a hack \u2014 identified by the Russian National Coordination Centre for Computer Incidents (NCCCI) were the same ones that Kaspersky had identified.<\/p>\n<p class=\"wp-block-paragraph\">Boris Larin, a security researcher at Kaspersky, told TechCrunch in an email that \u201cdespite our extensive research, we are unable to attribute Operation Triangulation to any known [<a href=\"https:\/\/techcrunch.com\/2025\/04\/25\/techcrunch-reference-guide-to-security-terminology\/#advanced-persistent-threat-apt\" target=\"_blank\" rel=\"noreferrer noopener\">Advanced Persistent Threat<\/a>] group or exploit development company.\u201d\u00a0<\/p>\n<p class=\"wp-block-paragraph\">Larin explained that Google linked Coruna to Operation Triangulation because they both exploit the same two vulnerabilities \u2014 Photon and Gallium.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">\u201cAttribution cannot be based solely on the fact of exploitation of these vulnerabilities. All the details of both vulnerabilities have long been publicly available,\u201d and thus anyone could have taken advantage of them, he said, adding that those two shared vulnerabilities \u201care just the tip of the iceberg.\u201d\u00a0\u00a0<\/p>\n<p class=\"wp-block-paragraph\">Kaspersky never publicly accused the U.S. government of being behind Operation Triangulation. Curiously, the logo that the company created for the campaign \u2014 an apple logo <a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2023\/06\/01112409\/sl-operation-triangulation_featured-800x450.jpg\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">composed of several triangles<\/a> \u2014 is reminiscent of <a href=\"https:\/\/encrypted-tbn0.gstatic.com\/images?q=tbn:ANd9GcRYH_ba_AFDAY4aNMBjDgp3RZgNrqiW0HjaQQ&amp;s\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">the L3Harris logo<\/a>, and Trenchant\u2019s <a href=\"https:\/\/x.com\/TrenchantARC\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">own logo<\/a> is made of two triangles. It may not be a coincidence. Kaspersky has previously said it wouldn\u2019t attribute a hacking campaign publicly while quietly signaling that it actually knew who was behind it, or who provided the tools for it.<\/p>\n<p class=\"wp-block-paragraph\">In 2014, Kaspersky <a href=\"https:\/\/mashable.com\/archive\/kaspersky-lab-the-mask-careto\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">announced<\/a> that it had caught a sophisticated and elusive government hacking group known as \u201cCareto\u201d (Spanish for \u201cthe Mask\u201d). The company only said the hackers spoke Spanish. But the illustration of a mask that the company used in its report included the red and yellow colors of Spain\u2019s flag, bull\u2019s horns and nose ring, and castanets.<\/p>\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/techcrunch.com\/2025\/05\/23\/mysterious-hacking-group-careto-was-run-by-the-spanish-government-sources-say\/\" target=\"_blank\" rel=\"noreferrer noopener\">As TechCrunch revealed last year<\/a>, Kaspersky researchers had privately concluded that \u201cthere was no doubt,\u201d as one of them put it, that Careto was run by the Spanish government.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">On Wednesday, cybersecurity journalist Patrick Gray <a href=\"http:\/\/youtube.com\/watch?v=4MwR6dRixJo&amp;t=840s\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">said on an episode of his podcast Risky Business<\/a> that he thought \u2014 based on \u201cbits and pieces\u201d he was confident about \u2014 that what Williams leaked to Operation Zero was the hacking kit used in the Triangulation campaign.\u00a0\u00a0\u00a0<\/p>\n<p class=\"wp-block-paragraph\">Apple, Google, and Operation Zero did not respond to requests for comment.<\/p>\n<p class=\"wp-block-paragraph\"><em>This post originally published at March 9 at 6:56 p.m. PT<\/em><\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/techcrunch.com\/2026\/03\/10\/us-military-contractor-likely-built-iphone-hacking-tools-used-by-russian-spies-in-ukraine\/\" target=\"_blank\" rel=\"noopener\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A mass hacking campaign targeting iPhone users in Ukraine and China used tools that were likely designed by U.S. military contractor L3Harris, TechCrunch has learned. The tools, which were intended for Western spies, wound up in the hands of various hacking groups, including Russian government spooks and Chinese cybercriminals. Last week, Google revealed that over [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":227728,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14],"tags":[],"class_list":{"0":"post-227727","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tech"},"_links":{"self":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts\/227727","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/comments?post=227727"}],"version-history":[{"count":0,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts\/227727\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/media\/227728"}],"wp:attachment":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/media?parent=227727"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/categories?post=227727"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/tags?post=227727"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}