{"id":230983,"date":"2026-03-26T14:09:40","date_gmt":"2026-03-26T14:09:40","guid":{"rendered":"https:\/\/entertainment.runfyers.com\/index.php\/2026\/03\/26\/a-major-hacking-tool-has-leaked-online-putting-millions-of-iphones-at-risk-heres-what-you-need-to-know-techcrunch\/"},"modified":"2026-03-26T14:09:40","modified_gmt":"2026-03-26T14:09:40","slug":"a-major-hacking-tool-has-leaked-online-putting-millions-of-iphones-at-risk-heres-what-you-need-to-know-techcrunch","status":"publish","type":"post","link":"https:\/\/entertainment.runfyers.com\/index.php\/2026\/03\/26\/a-major-hacking-tool-has-leaked-online-putting-millions-of-iphones-at-risk-heres-what-you-need-to-know-techcrunch\/","title":{"rendered":"A major hacking tool has leaked online, putting millions of iPhones at risk. Here\u2019s what you need to know. | TechCrunch"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p id=\"speakable-summary\" class=\"wp-block-paragraph\">Security researchers have uncovered a series of cyberattacks targeting Apple customers across the world. The tools used in these hacking campaigns have been dubbed <a href=\"https:\/\/techcrunch.com\/2026\/03\/03\/a-suite-of-government-hacking-tools-targeting-iphones-is-now-being-used-by-cybercriminals\/\" target=\"_blank\" rel=\"noopener\">Coruna<\/a> and <a href=\"https:\/\/techcrunch.com\/2026\/03\/18\/russians-caught-stealing-personal-data-from-ukrainians-with-new-advanced-iphone-hacking-tools\/\" target=\"_blank\" rel=\"noopener\">DarkSword<\/a>, and they have been used by both government spies and cybercriminals to steal data from people\u2019s iPhones and iPads.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">It\u2019s rare to see widespread hacks targeting iPhone and iPad users. In the last decade, the only precedents have been attacks against Uyghurs Muslims in <a rel=\"nofollow noopener\" href=\"https:\/\/www.technologyreview.com\/2021\/05\/06\/1024621\/china-apple-spy-uyghur-hacker-tianfu\/\" target=\"_blank\">China<\/a>, and against people in <a href=\"https:\/\/www.wired.com\/story\/ios-macos-hacks-hong-kong-watering-hole\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Hong Kong<\/a>.<\/p>\n<p class=\"wp-block-paragraph\">Now, some of these powerful hacking tools have <a href=\"https:\/\/techcrunch.com\/2026\/03\/23\/someone-has-publicly-leaked-an-exploit-kit-that-can-hack-millions-of-iphones\/\" target=\"_blank\" rel=\"noopener\">leaked online<\/a>, potentially putting hundreds of millions of iPhones and iPads running out-of-date software at risk of data thefts.<\/p>\n<p class=\"wp-block-paragraph\">We are breaking down what we know and what we don\u2019t about these latest iPhone and iPad hacking threats, and what you can do to stay protected.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-what-are-coruna-and-darksword\"><strong>What are Coruna and DarkSword?<\/strong><\/h2>\n<p class=\"wp-block-paragraph\">Coruna and DarkSword are two sets of advanced hacking toolkits that each contain a range of exploits capable of breaking into iPhones and iPads and stealing a person\u2019s data, such as their messages, browser data, location history, and cryptocurrency.<\/p>\n<p class=\"wp-block-paragraph\">Security researchers who discovered the toolkits say Coruna\u2019s exploits can hack iPhones and iPads running iOS 13 through iOS 17.2.1, which was released in December 2023.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">DarkSword, however, contains exploits capable of hacking iPhones and iPads with more recent devices running iOS 18.4 and 18.7, released in September 2025, according to security researchers with Google who are investigating the code.<\/p>\n<p class=\"wp-block-paragraph\">But the threat from DarkSword is more immediate to the general public. Someone <a href=\"https:\/\/techcrunch.com\/2026\/03\/23\/someone-has-publicly-leaked-an-exploit-kit-that-can-hack-millions-of-iphones\/\" target=\"_blank\" rel=\"noopener\">leaked part of DarkSword and published it on code-sharing site GitHub<\/a>, making it easy for anyone to download the malicious code and launch their own attacks targeting Apple users running older versions of iOS.\u00a0<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-how-do-coruna-and-darksword-work\"><strong>How do Coruna and DarkSword work?<\/strong><\/h2>\n<p class=\"wp-block-paragraph\">These types of attacks are by definition indiscriminate and dangerous, as they can ensnare anyone who visits a certain website hosting the malicious code.<\/p>\n<div class=\"article-block block--callout block--right has-green-500-background-color\">\n<h4 class=\"block--callout__title\">Contact Us<\/h4>\n<p>\t\t\tDo you have more information about DarkSword, Coruna, or other government hacking and spyware tools? From a non-work device, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram, Keybase and Wire @lorenzofb, or <a href=\"https:\/\/techcrunch.com\/2026\/03\/26\/a-major-hacking-tool-has-leaked-online-putting-millions-of-iphones-at-risk-heres-what-you-need-to-know\/mailto:lorenzo@techcrunch.com\/\" target=\"_blank\" rel=\"noopener\">by email<\/a><a href=\"https:\/\/techcrunch.com\/2026\/03\/26\/a-major-hacking-tool-has-leaked-online-putting-millions-of-iphones-at-risk-heres-what-you-need-to-know\/mailto:lorenzo@techcrunch.com\/\" target=\"_blank\" rel=\"noopener\">.<\/a> \t\t<\/div>\n<p class=\"wp-block-paragraph\">In some cases, victims can be hacked simply by visiting a legitimate website under the control of malicious hackers.<\/p>\n<p class=\"wp-block-paragraph\">When victims are initially infected, Coruna and DarkSword exploit several vulnerabilities in iOS that let hackers virtually take full control of the target\u2019s device, allowing them to steal the person\u2019s private data. The data is then uploaded to a web server run by the hackers.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">At least some parts of the Coruna toolkit, <a href=\"https:\/\/techcrunch.com\/2026\/03\/10\/us-military-contractor-likely-built-iphone-hacking-tools-used-by-russian-spies-in-ukraine\/\" target=\"_blank\" rel=\"noopener\">as TechCrunch previously reported<\/a>, were originally developed by Trenchant, a hacking and spyware unit within U.S. defense contractor L3Harris, which sells exploits to the U.S. government and its top allies.<\/p>\n<p class=\"wp-block-paragraph\">Kaspersky has also linked two exploits in Coruna\u2019s toolkit to <a href=\"https:\/\/securelist.com\/coruna-framework-updated-operation-triangulation-exploit\/119228\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Operation Triangulation<\/a>, a complex and likely government-led cyberattack allegedly carried out <a href=\"https:\/\/techcrunch.com\/2023\/06\/01\/kaspersky-says-attackers-hacked-staff-iphones-with-unknown-malware\/\" target=\"_blank\" rel=\"noopener\">against Russian iPhone users<\/a>.<\/p>\n<p class=\"wp-block-paragraph\">After Trenchant developed Coruna \u2014 somehow, it\u2019s not clear how \u2014 these exploits found their way into the hands of Russian spies and Chinese cybercriminals, perhaps through one or several intermediaries who sell exploits on the underground market.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">Coruna\u2019s travels show again that powerful hacking tools, including those developed for the U.S. under tight secrecy restrictions, can leak and proliferate out of control.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">One example of this was in 2017 when an exploit developed by the U.S. National Security Agency, which was capable of remotely breaking into Windows computers around the world, leaked online. The same exploit was then used in <a href=\"https:\/\/techcrunch.com\/2017\/05\/15\/wannacry-ransomware-is-still-spreading-fast-but-kill-switch-defenses-hold-for-now\/\" target=\"_blank\" rel=\"noopener\">the destructive WannaCry ransomware attack<\/a>, which <a href=\"https:\/\/www.bbc.com\/news\/world-39919249\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">indiscriminately hacked<\/a> hundreds of thousands of computers across the world.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">In the case of DarkSword, researchers have observed attacks targeting users in China, Malaysia, Turkey, Saudi Arabia, and Ukraine. It remains unclear who originally developed DarkSword, how it ended up with different hacking groups, or how the tools were leaked online.<\/p>\n<p class=\"wp-block-paragraph\">It\u2019s unclear who leaked and published online to GitHub, or for what reason.<\/p>\n<p class=\"wp-block-paragraph\">The hacking tools, which TechCrunch has seen, are written in the web languages HTML and JavaScript, making them relatively easy to configure and self-host anywhere by anyone wanting to launch malicious attacks. (TechCrunch is not linking to GitHub as the tools can be used in malicious attacks.) Researchers <a href=\"https:\/\/x.com\/matteyeux\/status\/2035994616504226140\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">posting on X<\/a> have already tested the leaked tools by hacking into their own Apple devices running vulnerable versions of the company\u2019s software.<\/p>\n<p class=\"wp-block-paragraph\">DarkSword is now \u201cessentially plug-and-play,\u201d as Justin Albrecht, principal researcher at mobile security firm Lookout, explained to TechCrunch.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">GitHub told TechCrunch that it has not taken down the leaked code, but will preserve it for security research.<\/p>\n<p class=\"wp-block-paragraph\">\u201cGitHub\u2019s Acceptable Use Policies prohibit posting content that directly supports unlawful active attack or malware campaigns that are causing technical harms,\u201d GitHub\u2019s online safety counsel Jesse Geraci told TechCrunch. \u201cHowever, we do not prohibit the posting of source code which could be used to develop malware or exploits, as the publication and distribution of such source code has educational value and provides a net benefit to the security community.\u201d<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-is-my-iphone-or-ipad-vulnerable-to-darksword\"><strong>Is my iPhone or iPad vulnerable to DarkSword?<\/strong><\/h2>\n<p class=\"wp-block-paragraph\">If you have an iPhone or iPad that is not up to date, you should consider updating immediately.<\/p>\n<p class=\"wp-block-paragraph\">Apple told TechCrunch that users running the latest versions of iOS 15 through iOS 26 are already protected.<\/p>\n<p class=\"wp-block-paragraph\">According to <a href=\"https:\/\/iverify.io\/blog\/darksword-ios-exploit-kit-explained\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">iVerify:<\/a> \u201cWe strongly recommend updating to iOS 18.7.6 or iOS 26.3.1. This will mitigate all vulnerabilities that have been exploited in these attack chains.\u201d<\/p>\n<p class=\"wp-block-paragraph\">According to <a href=\"https:\/\/developer.apple.com\/support\/app-store\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Apple\u2019s own statistics<\/a>, almost one-in-three iPhone and iPad users are still not running the latest iOS 26 software. That means there are potentially hundreds of millions of devices vulnerable to these hacking tools, since Apple touts <a href=\"https:\/\/www.apple.com\/newsroom\/2026\/01\/apple-reports-first-quarter-results\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">more than 2.5 billion<\/a> active devices around the world.\u00a0<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-what-if-i-can-t-or-don-t-want-to-upgrade-to-ios-26\"><strong>What if I can\u2019t or don\u2019t want to upgrade to iOS 26?<\/strong><\/h2>\n<p class=\"wp-block-paragraph\">Apple also said that devices running Lockdown Mode, <a href=\"https:\/\/techcrunch.com\/2022\/08\/12\/apple-lockdown-mode-ios-16\/\" target=\"_blank\" rel=\"noopener\">an opt-in extra security feature first introduced in iOS 16<\/a>, also blocks these specific attacks.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">Lockdown Mode is helpful for journalists, dissidents, human rights activists, and anyone who thinks they may be targeted for who they are, or the work that they do.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">While Lockdown Mode <a href=\"https:\/\/techcrunch.com\/2025\/03\/13\/apples-lockdown-mode-is-good-for-security-but-its-notifications-are-baffling\/\" target=\"_blank\" rel=\"noopener\">is not perfect<\/a>, there has been no public evidence that hackers have to date ever been able to bypass its protections. (We asked Apple if that claim still holds true, and will update if we hear back.) Lockdown Mode was <a href=\"https:\/\/techcrunch.com\/2023\/04\/18\/apple-lockdown-mode-iphone-nso-pegasus\/\" target=\"_blank\" rel=\"noopener\">found to have prevented<\/a> at least one attempt to plant spyware on a human rights defender\u2019s phone.<\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/techcrunch.com\/2026\/03\/26\/a-major-hacking-tool-has-leaked-online-putting-millions-of-iphones-at-risk-heres-what-you-need-to-know\/\" target=\"_blank\" rel=\"noopener\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security researchers have uncovered a series of cyberattacks targeting Apple customers across the world. The tools used in these hacking campaigns have been dubbed Coruna and DarkSword, and they have been used by both government spies and cybercriminals to steal data from people\u2019s iPhones and iPads.\u00a0 It\u2019s rare to see widespread hacks targeting iPhone and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":230984,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14],"tags":[],"class_list":{"0":"post-230983","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tech"},"_links":{"self":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts\/230983","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/comments?post=230983"}],"version-history":[{"count":0,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts\/230983\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/media\/230984"}],"wp:attachment":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/media?parent=230983"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/categories?post=230983"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/tags?post=230983"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}