News: 0180901166

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

A Possible US Government iPhone-Hacking Toolkit Is Now In the Hands of Foreign Spies, Criminals (wired.com)

(Tuesday March 03, 2026 @10:00PM (BeauHD) from the would-you-look-at-that dept.)


Security researchers say a highly sophisticated iPhone exploitation toolkit dubbed "Coruna," which possibly originated from a U.S. government contractor, has [1]spread from suspected Russian espionage operations to crypto-stealing criminal campaigns . Apple has patched the exploited vulnerabilities in newer iOS versions, but tens of thousands of devices may have already been compromised. An anonymous reader quotes an excerpt from Wired's report:

> Security researchers at Google on Tuesday [2]released a report describing what they're calling "Coruna," a highly sophisticated iPhone hacking toolkit that includes five complete hacking techniques capable of bypassing all the defenses of an iPhone to silently install malware on a device when it visits a website containing the exploitation code. In total, Coruna takes advantage of 23 distinct vulnerabilities in iOS, a rare collection of hacking components that suggests it was created by a well-resourced, likely state-sponsored group of hackers.

>

> In fact, Google traces components of Coruna to hacking techniques it spotted in use in February of last year and attributed to what it describes only as a "customer of a surveillance company." Then, five months later, Google says a more complete version of Coruna reappeared in what appears to have been an espionage campaign carried out by a suspected Russian spy group, which hid the hacking code in a common visitor-counting component of Ukrainian websites. Finally, Google spotted Coruna in use yet again in what seems to have been a purely profit-focused hacking campaign, infecting Chinese-language crypto and gambling sites to deliver malware that steals victims cryptocurrency.

>

> Conspicuously absent from Google's report is any mention of who the original surveillance company "customer" that deployed Coruna may have been. But the mobile security company iVerify, which also analyzed a version of Coruna it obtained from one of the infected Chinese sites, suggests the code may well have started life as a hacking kit built for or purchased by the US government. Google and iVerify both note that Coruna contains multiple components previously used in a hacking operation known as "Triangulation" that was discovered targeting Russian cybersecurity firm Kaspersky in 2023, which the Russian government claimed was the work of the NSA. (The US government didn't respond to Russia's claim.)

>

> Coruna's code also appears to have been originally written by English-speaking coders, notes iVerify's cofounder Rocky Cole. "It's highly sophisticated, took millions of dollars to develop, and it bears the hallmarks of other modules that have been publicly attributed to the US government," Cole tells WIRED. "This is the first example we've seen of very likely US government tools -- based on what the code is telling us -- spinning out of control and being used by both our adversaries and cybercriminal groups." Regardless of Coruna's origin, Google warns that a highly valuable and rare hacking toolkit appears to have traveled through a series of unlikely hands, and now exists in the wild where it could still be adopted -- or adapted -- by any hacker group seeking to target iPhone users.

"How this proliferation occurred is unclear, but suggests an active market for 'second hand' zero-day exploits," Google's report reads. "Beyond these identified exploits, multiple threat actors have now acquired advanced exploitation techniques that can be re-used and modified with newly identified vulnerabilities."



[1] https://www.wired.com/story/coruna-iphone-hacking-toolkit-us-government/

[2] https://cloud.google.com/blog/topics/threat-intelligence/coruna-powerful-ios-exploit-kit



Oops! (Score:2)

by OrangeTide ( 124937 )

The good guys need these tools to stop the bad guys. But we never counted on the "good" guys being incompetent.

Don't worry folks, we'll solve the problems by adding even more surveillance to the state.

Re: (Score:1)

by innocent_white_lamb ( 151825 )

Just repeat the arguments against "golden key" "lawful access" encryption.

Same thing applies here and this is even a real world example for anyone to point to if evidence needs to be provided.

Re: (Score:2)

by Mr. Dollar Ton ( 5495648 )

There are no "good guys" in this business.

All this has been chewed on since forever, and from the point of general security the case has been settled decades ago.

if you find a bug and don't report it, it will eventually come to bite you in the ass, in proportion with the popularity of the platform the bug is deployed on.

Nobody has ever demonstrated a case where hiding a bug on a popular platform to "catch the bad guys" has brought more good than bad.

But the powers that be cannot refrain from going the easie

I preferred the old days (Score:2)

by jenningsthecat ( 1525947 )

I remember when crooks had to actually find and remove tangible items - money, or jewellery and other goods - in order to steal wealth. Then came credit card theft which, bad though it was, had nothing on the cyber-theft described in TFA.

Additionally, it's oh-so-nice to learn that the US government probably funded the development of this hacking tool. American tax dollars at work helping criminals - gotta love it.

The world sure is a crazy place these days...

Criminals? (Score:2)

by Luthair ( 847766 )

Like the goons running the government at the moment

Standards are crucial. And the best thing about standards is: there are
so ____many to choose from!