CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership Mar 18, 2026

DarkSword: iPhone Exploit Kit Serves Spies & Thieves Alike

Dark Reading Archived Mar 18, 2026 ✓ Full text saved

A sophisticated iOS exploit chain leverages multiple zero-day vulnerabilities and is targeting users in Saudi Arabia, Turkey, Malaysia, and Ukraine.

Full text archived locally
✦ AI Summary · Claude Sonnet


    THREAT INTELLIGENCE MOBILE SECURITY CYBERSECURITY OPERATIONS VULNERABILITIES & THREATS NEWS DarkSword: iPhone Exploit Kit Serves Spies & Thieves Alike A sophisticated iOS exploit chain leverages multiple zero-day vulnerabilities and is targeting users in Saudi Arabia, Turkey, Malaysia, and Ukraine. Alexander Culafi,Senior News Writer,Dark Reading March 18, 2026 5 Min Read SOURCE: EUGENIUSZ DUDZIŃSKI VIA ALAMY STOCK PHOTO A new iOS exploit chain is being used by attackers around the globe, and it's built for espionage actors and financially motivated attackers alike. Google, iVerify, and Lookout this week published research concerning "DarkSword," an exploit chain targeting iPhones running iOS versions 18.4 through 18.7. Google's Threat Intelligence Group (GTIG) referred to it in a blog post as a "full-chain exploit that leveraged multiple zero-day vulnerabilities to fully compromise devices," and has been used by multiple commercial surveillance vendors and suspected state-sponsored threat actors to target users in Saudi Arabia, Turkey, Malaysia, and Ukraine since at least November 2025. GTIG said the exploit chain utilizes several vulnerabilities and, depending on the attack, three distinct malware families it tracks as Ghostblade, Ghostknife, and Ghostsaber. It follows two weeks behind the disclosure of a similar attack, dubbed "Coruna," in which a financially motivated criminal group leveraged tools developed by a spyware vendor to mass target iOS devices. Related:SideWinder Espionage Campaign Expands Across Southeast Asia The vulnerabilities include JavaScriptCore memory corruption flaws CVE-2025-31277 and CVE-2025-43529, dyld user-mode pointer authentication code bypass CVE-2026-20700, ANGLE memory corruption flaw CVE-2025-14174, iOS kernel memory management flaw CVE-2025-43510, and iOS kernel memory corruption bug CVE-2025-43520. At different stages, these vulnerabilities enable remote code execution (RCE), sandbox escape, and privilege escalation leading to payload delivery.  In a DarkSword attack, a vulnerable iPhone user visits a malicious website and, in one click, executes the complete chain to fully compromise a device, gain kernel privileges, and exfiltrate sensitive data from the victim's phone. It collects data quickly (within seconds to minutes) before removing itself from the target device. What's most unusual about DarkSword (and its predecessor two weeks ago) is that it isn't just for espionage actors. Lookout's blog post highlighted the fact that DarkSword's data theft capabilities also target cryptocurrency wallets. "This dual-use approach is an important insight into the threat actor's motives and indicates that they (or possibly a previous user of DarkSword who then passed it on to them) are operating with a motive of monetary gain," the post read. Loading... Pete Luban, field chief information security officer (CISO) at AttackIQ, tells Dark Reading that there is some precedence for this on the surface; once a sophisticated chain gets exposed somehow, it can be repurposed by those looking to get a payout. The more unusual part, Luban says, is that these dual-use cases are formally integrated into the process. Related:Less Lucrative Ransomware Market Makes Attackers Alter Methods "Defenders need to treat mobile zero-days like enterprise-grade intrusion paths, which includes validating controls continuously and not assuming an intrusion will stay inside the box it's labeled with," he says. "'Financial' and 'espionage' are convenient categories, but the same access and tooling can enable both outcomes in the same campaign." Multiple Sophisticated (and Less Sophisticated) Attackers Google covered one campaign from November 2025, where Saudi Arabian users were targeted by a phony website promising secure Snapchat messaging. Also in November, GTIG observed the DarkSword chain being used in Turkey, with activity being connected to Turkish surveillance vendor PARS Defense. Another PARS Defense customer used DarkSword against Malaysian users in January. One of the most interesting threat actors utilizing DarkSword is UNC6353, a suspected Russian espionage group that previously also used the similar Coruna exploit. This group launched watering hole attacks against Ukrainian users. Lookout's research noted that despite being an espionage actor, no attempts were made to obfuscate the exploit chain or implant code, and that an "analysis of patterns suggests that LLMs were used in the creation of at least some of the implant code."  Related:Hackers Target Cybersecurity Firm Outpost24 in 7-Stage Phish This could suggest limited sophistication on the part of this actor despite the probability of substantial funding or, as Lookout pointed out in its blog, "this code may have been added prior to the threat actor's acquisition of the tooling." And indeed, iVerify's blog post notes that in the case of Coruna and DarkSword, the tools were discovered due to significant operational security (OPSEC) failures and carelessness in deploying iOS offensive capabilities.  "These recent events prompt several key questions: How big and well equipped is the market for iOS zero-day and n-day exploits for iOS devices? How accessible are such powerful capabilities to financially motivated actors?" iVerify's post read. Rocky Cole, iVerify's co-founder and chief operating officer (COO), says this poor level of OPSEC is "unprecedented in the 2020s." "Sometimes you see nation-states use poor OPSEC when they are using low-value tools because they don't want to burn the fancy, highly secretive [command and control]," he says. "And OPSEC slows you down. So sometimes when they want to move quickly, they'll use lower value tools with lower levels of opsec. That could be what's happening here given these were largely n-days. And these observations aren't necessarily specific to the mobile spyware world, just in general." A Challenging Outlook for the Future of iOS Exploit Chains Although all vulnerabilities have been addressed by software updates — iPhone users should update to iOS 18.7.6 or iOS 26.3.1 — iVerify estimated that more than 200 million users may still be vulnerable. Users may also want to consider whether Lockdown Mode could be right for them. Matthias Frielingsdorf, co-founder and VP of research at iVerify, tells Dark Reading that DarkSword shows that even with automatic updates and the like, a large number of iOS users remain vulnerable.  "Many people are still not adhering to security hygiene best practices, including keeping devices updated with the latest OS," he says. "The share of users running legacy is large enough for threat actors to target and support a thriving secondary market for n-day exploits. We predicted this exact scenario for some time and unfortunately, it's coming to pass." About the Author Alexander Culafi Senior News Writer, Dark Reading Alex is an award-winning writer, journalist, and podcast host based in Boston. After cutting his teeth writing for independent gaming publications as a teenager, he graduated from Emerson College in 2016 with a Bachelor of Science in journalism. He has previously been published on VentureFizz, Search Security, Nintendo World Report, and elsewhere. In his spare time, Alex hosts the weekly Nintendo podcast Talk Nintendo Podcast and works on personal writing projects, including two previously self-published science fiction novels. More Insights Industry Reports Frost Radar™: Non-human Identity Solutions 2026 CISO AI Risk Report Cybersecurity Forecast 2026 The ROI of AI in Security ThreatLabz 2025 Ransomware Report Access More Research Webinars Building a Robust SOC in a Post-AI World Retail Security: Protecting Customer Data and Payment Systems Rethinking SSE: When Unified SASE Delivers the Flexibility Enterprises Need Securing Remote and Hybrid Work Forecast: Beyond the VPN AI-Powered Threat Detection: Beyond Traditional Security Models More Webinars You May Also Like THREAT INTELLIGENCE React2Shell Exploits Flood the Internet as Attacks Continue by Rob Wright DEC 12, 2025 THREAT INTELLIGENCE Chinese Gov't Fronts Trick the West to Obtain Cyber Tech by Nate Nelson, Contributing Writer OCT 06, 2025 CYBERATTACKS & DATA BREACHES DeepSeek Breach Opens Floodgates to Dark Web by Emma Zaballos APR 22, 2025 THREAT INTELLIGENCE Trump Targets Krebs, Revokes SentinelOne Security Clearance by Kristina Beek, Associate Editor, Dark Reading APR 10, 2025 Editor's Choice CYBERSECURITY OPERATIONS Why Stryker's Outage Is a Disaster Recovery Wake-Up Call byJai Vijayan MAR 12, 2026 5 MIN READ CYBER RISK What Orgs Can Learn From Olympics, World Cup IR Plans byTara Seals MAR 12, 2026 THREAT INTELLIGENCE Commercial Spyware Opponents Fear US Policy Shifting byRob Wright MAR 12, 2026 9 MIN READ Want more Dark Reading stories in your Google search results? 2026 Security Trends & Outlooks THREAT INTELLIGENCE Cybersecurity Predictions for 2026: Navigating the Future of Digital Threats JAN 2, 2026 CYBER RISK Navigating Privacy and Cybersecurity Laws in 2026 Will Prove Difficult JAN 12, 2026 ENDPOINT SECURITY CISOs Face a Tighter Insurance Market in 2026 JAN 5, 2026 THREAT INTELLIGENCE 2026: The Year Agentic AI Becomes the Attack-Surface Poster Child JAN 30, 2026 Download the Collection Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. SUBSCRIBE Webinars Building a Robust SOC in a Post-AI World THURS, MARCH 19, 2026 AT 1PM EST Retail Security: Protecting Customer Data and Payment Systems THURS, APRIL 2, 2026 AT 1PM EST Rethinking SSE: When Unified SASE Delivers the Flexibility Enterprises Need WED, APRIL 1, 2026 AT 1PM EST Securing Remote and Hybrid Work Forecast: Beyond the VPN TUES, MARCH 10, 2026 AT 1PM EST AI-Powered Threat Detection: Beyond Traditional Security Models WED, MARCH 25, 2026 AT 1PM EST More Webinars White Papers Autonomous Pentesting at Machine Speed, Without False Positives Fixing Organizations' Identity Security Posture Best practices for incident response planning Industry Report: AI, SOC, and Modernizing Cybersecurity The Threat Prevention Buyer's Guide: Find the best AI-driven threat protection solution to stop file-based attacks. Explore More White Papers GISEC GLOBAL 2026 GISEC GLOBAL is the most influential and the largest cybersecurity gathering in the Middle East & Africa, uniting global CISOs, government leaders, technology buyers, and ethical hackers for three power-packed days of innovation, strategy, and live cyber drills. 📌 BOOK YOUR SPACE
    💬 Team Notes
    Article Info
    Source
    Dark Reading
    Category
    ◇ Industry News & Leadership
    Published
    Mar 18, 2026
    Archived
    Mar 18, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗