A major hacking tool has leaked online, putting millions of iPhones at risk. Here’s what you need to know
好的,我现在需要帮用户总结一篇文章的内容,控制在100个字以内。用户已经提供了文章的英文内容,我需要先通读并理解文章的主要信息。 文章主要讲的是安全研究人员发现了一系列针对苹果用户的网络攻击,使用的工具是Coruna和DarkSword。这些工具被政府间谍和网络犯罪分子用来窃取iPhone和iPad的数据。值得注意的是,针对苹果用户的广泛攻击并不常见,这次攻击影响了全球数百万用户。 此外,DarkSword的部分代码泄露到了GitHub上,这使得更多人可以下载并发起攻击。苹果建议用户更新到最新版本的iOS以避免漏洞被利用,并且提到了Lockdown Mode作为额外的安全措施。 总结的时候,我需要涵盖以下几点: 1. 攻击目标:苹果用户 2. 工具名称:Coruna和DarkSword 3. 攻击者类型:政府间谍和网络犯罪分子 4. 泄露情况:DarkSword代码泄露 5. 影响范围:全球数百万用户 6. 建议措施:更新系统和使用Lockdown Mode 现在我要把这些信息浓缩成100字以内,确保内容准确且简洁。 </think> 安全研究人员发现针对苹果用户的网络攻击工具Coruna和DarkSword被用于窃取数据。这些工具由政府间谍和网络犯罪分子使用,并已泄露至GitHub,影响全球数百万设备。苹果建议用户更新至最新iOS版本以防范漏洞,并启用Lockdown Mode增强安全。 2026-3-26 15:3:45 Author: techcrunch.com(查看原文) 阅读量:2 收藏

Security researchers have uncovered a series of cyberattacks targeting Apple customers across the world. The tools used in these hacking campaigns have been dubbed Coruna and DarkSword, and they have been used by both government spies and cybercriminals to steal data from people’s iPhones and iPads. 

It’s rare to see widespread hacks targeting iPhone and iPad users. In the last decade, the only precedents have been attacks against Uyghurs Muslims in China, and against people in Hong Kong.

Now, some of these powerful hacking tools have leaked online, potentially putting hundreds of millions of iPhones and iPads running out-of-date software at risk of data thefts.

We are breaking down what we know and what we don’t about these latest iPhone and iPad hacking threats, and what you can do to stay protected.

What are Coruna and DarkSword?

Coruna and DarkSword are two sets of advanced hacking toolkits that each contain a range of exploits capable of breaking into iPhones and iPads and stealing a person’s data, such as their messages, browser data, location history, and cryptocurrency.

Security researchers who discovered the toolkits say Coruna’s exploits can hack iPhones and iPads running iOS 13 through iOS 17.2.1, which was released in December 2023. 

DarkSword, however, contains exploits capable of hacking iPhones and iPads with more recent devices running iOS 18.4 and 18.7, released in September 2025, according to security researchers with Google who are investigating the code.

But the threat from DarkSword is more immediate to the general public. Someone leaked part of DarkSword and published it on code-sharing site GitHub, making it easy for anyone to download the malicious code and launch their own attacks targeting Apple users running older versions of iOS. 

How do Coruna and DarkSword work?

These types of attacks are by definition indiscriminate and dangerous, as they can ensnare anyone who visits a certain website hosting the malicious code.

Contact Us

Do you have more information about DarkSword, Coruna, or other government hacking and spyware tools? From a non-work device, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram, Keybase and Wire @lorenzofb, or by email.

In some cases, victims can be hacked simply by visiting a legitimate website under the control of malicious hackers.

When victims are initially infected, Coruna and DarkSword exploit several vulnerabilities in iOS that let hackers virtually take full control of the target’s device, allowing them to steal the person’s private data. The data is then uploaded to a web server run by the hackers. 

At least some parts of the Coruna toolkit, as TechCrunch previously reported, were originally developed by Trenchant, a hacking and spyware unit within U.S. defense contractor L3Harris, which sells exploits to the U.S. government and its top allies.

Kaspersky has also linked two exploits in Coruna’s toolkit to Operation Triangulation, a complex and likely government-led cyberattack allegedly carried out against Russian iPhone users.

After Trenchant developed Coruna — somehow, it’s not clear how — these exploits found their way into the hands of Russian spies and Chinese cybercriminals, perhaps through one or several intermediaries who sell exploits on the underground market. 

Coruna’s travels show again that powerful hacking tools, including those developed for the U.S. under tight secrecy restrictions, can leak and proliferate out of control. 

One example of this was in 2017 when an exploit developed by the U.S. National Security Agency, which was capable of remotely breaking into Windows computers around the world, leaked online. The same exploit was then used in the destructive WannaCry ransomware attack, which indiscriminately hacked hundreds of thousands of computers across the world. 

In the case of DarkSword, researchers have observed attacks targeting users in China, Malaysia, Turkey, Saudi Arabia, and Ukraine. It remains unclear who originally developed DarkSword, how it ended up with different hacking groups, or how the tools were leaked online.

It’s unclear who leaked and published online to GitHub, or for what reason.

The hacking tools, which TechCrunch has seen, are written in the web languages HTML and JavaScript, making them relatively easy to configure and self-host anywhere by anyone wanting to launch malicious attacks. (TechCrunch is not linking to GitHub as the tools can be used in malicious attacks.) Researchers posting on X have already tested the leaked tools by hacking into their own Apple devices running vulnerable versions of the company’s software.

DarkSword is now “essentially plug-and-play,” as Justin Albrecht, principal researcher at mobile security firm Lookout, explained to TechCrunch. 

GitHub told TechCrunch that it has not taken down the leaked code, but will preserve it for security research.

“GitHub’s Acceptable Use Policies prohibit posting content that directly supports unlawful active attack or malware campaigns that are causing technical harms,” GitHub’s online safety counsel Jesse Geraci told TechCrunch. “However, we do not prohibit the posting of source code which could be used to develop malware or exploits, as the publication and distribution of such source code has educational value and provides a net benefit to the security community.”

Is my iPhone or iPad vulnerable to DarkSword?

If you have an iPhone or iPad that is not up to date, you should consider updating immediately.

Apple told TechCrunch that users running the latest versions of iOS 15 through iOS 26 are already protected.

According to iVerify: “We strongly recommend updating to iOS 18.7.6 or iOS 26.3.1. This will mitigate all vulnerabilities that have been exploited in these attack chains.”

According to Apple’s own statistics, almost one-in-three iPhone and iPad users are still not running the latest iOS 26 software. That means there are potentially hundreds of millions of devices vulnerable to these hacking tools, since Apple touts more than 2.5 billion active devices around the world. 

What if I can’t or don’t want to upgrade to iOS 26?

Apple also said that devices running Lockdown Mode, an opt-in extra security feature first introduced in iOS 16, also blocks these specific attacks. 

Lockdown Mode is helpful for journalists, dissidents, human rights activists, and anyone who thinks they may be targeted for who they are, or the work that they do. 

While Lockdown Mode is not perfect, there has been no public evidence that hackers have to date ever been able to bypass its protections. (We asked Apple if that claim still holds true, and will update if we hear back.) Lockdown Mode was found to have prevented at least one attempt to plant spyware on a human rights defender’s phone.


文章来源: https://techcrunch.com/2026/03/26/a-major-hacking-tool-has-leaked-online-putting-millions-of-iphones-at-risk-heres-what-you-need-to-know/
如有侵权请联系:admin#unsafe.sh