Possible US Government iPhone Hacking Tool Leaked
嗯,用户让我帮忙总结一下这篇文章的内容,控制在100字以内,而且不需要特定的开头。首先,我需要通读整篇文章,抓住主要信息。 文章主要讲的是Google的安全研究人员发现了一个叫做Coruna的iPhone黑客工具包。这个工具包非常先进,利用了23个iOS漏洞,能够绕过iPhone的所有防御机制,在用户访问特定网站时悄悄安装恶意软件。 接着,文章提到Coruna的代码是由说英语的人编写的,推测可能是美国政府资助的项目。TechCrunch报道说,Coruna至少部分是由L3Harris公司的Trenchant部门开发的。两名前员工透露了这一点,并且匿名说话因为他们没有被授权谈论工作内容。 还有,文章提到可能有L3Harris的员工将Coruna卖给了俄罗斯政府,导致这个工具被泄露和滥用。 所以,总结的时候需要包括:Google发现Coruna工具包,利用23个漏洞绕过iPhone防御,可能由美国政府资助开发,并被泄露给俄罗斯等。 现在把这些信息浓缩到100字以内。要确保涵盖主要点:Google的研究、Coruna的功能、漏洞数量、开发者背景、泄露情况。 最后检查一下字数是否符合要求,并且语言简洁明了。 </think> Google安全研究人员发现名为“Coruna”的iPhone高级 hacking 工具包,利用23个iOS漏洞绕过防御,在访问恶意网站时安装恶意软件。该工具被认为由美国政府资助开发,并被泄露给俄罗斯等对手和网络犯罪集团使用。 2026-4-2 10:5:43 Author: securityboulevard.com(查看原文) 阅读量:2 收藏

Wired writes (alternate source):

Security researchers at Google on Tuesday released a report describing what they’re calling “Coruna,” a highly sophisticated iPhone hacking toolkit that includes five complete hacking techniques capable of bypassing all the defenses of an iPhone to silently install malware on a device when it visits a website containing the exploitation code. In total, Coruna takes advantage of 23 distinct vulnerabilities in iOS, a rare collection of hacking components that suggests it was created by a well-resourced, likely state-sponsored group of hackers.

[…]

Coruna’s code also appears to have been originally written by English-speaking coders, notes iVerify’s cofounder Rocky Cole. “It’s highly sophisticated, took millions of dollars to develop, and it bears the hallmarks of other modules that have been publicly attributed to the US government,” Cole tells WIRED. “This is the first example we’ve seen of very likely US government toolsbased on what the code is telling usspinning out of control and being used by both our adversaries and cybercriminal groups.”

TechCrunch reports that Coruna is definitely of US origin:

Two former employees of government contractor L3Harris told TechCrunch that Coruna was, at least in part, developed by the company’s hacking and surveillance tech division, Trenchant. The two former employees both had knowledge of the company’s iPhone hacking tools. Both spoke on condition of anonymity because they weren’t authorized to talk about their work for the company.

It’s always super interesting to see what malware looks like when it’s created through a professional software development process. And the TechCrunch article has some speculation as to how the US lost control of it. It seems that an employee of L3Harris’s surviellance tech division, Trenchant, sold it to the Russian government.

*** This is a Security Bloggers Network syndicated blog from Schneier on Security authored by Bruce Schneier. Read the original post at: https://www.schneier.com/blog/archives/2026/04/possible-us-government-iphone-hacking-tool-leaked.html


文章来源: https://securityboulevard.com/2026/04/possible-us-government-iphone-hacking-tool-leaked/
如有侵权请联系:admin#unsafe.sh