Threat IntelHIGH

Threat Intel - New iOS Exploit Kit Emerges from Russia

CSCyberScoop·Reporting by Tim Starks
📰 7 sources·Summary by CyberPings Editorial·AI-assisted·Reviewed by Rohit Rana
Updated:
🎯

Basically, a new hacking tool for iPhones has been found, possibly made by Russian hackers.

Quick Summary

A new iOS exploit kit named DarkSword has been discovered, linked to suspected Russian hackers. This could impact millions of iPhone users and raises serious security concerns. Understanding these threats is essential for mobile device protection.

The Threat

Researchers have uncovered a new iOS exploit kit named DarkSword, believed to be developed by suspected Russian hackers. This discovery follows the earlier identification of a similar kit, Coruna, and highlights a worrying trend in mobile cyberattacks. The collaboration between iVerify, Lookout, and Google reveals that DarkSword could potentially affect up to 270 million iPhone users worldwide. This is alarming, especially since 15% of all iOS devices are running versions that could be vulnerable.

The implications of DarkSword are severe. Unlike Coruna, which primarily targeted financial gain, DarkSword appears to serve dual purposes: financial exploitation and surveillance. It can exfiltrate sensitive information such as passwords, cryptocurrency wallets, and text messages. This shift towards mobile attacks is significant as mobile devices now account for a larger share of internet traffic.

Who's Behind It

While the exact identities of the attackers remain unclear, there are strong indications linking DarkSword to Russian cyber-espionage groups. Google has attributed the campaign to a group it tracks as UNC6353, which is known for its ties to Russian state-sponsored activities. The presence of a secondary exploit market raises concerns about the proliferation of such tools, making it easier for less experienced hackers to launch sophisticated attacks.

Interestingly, the code within DarkSword shows signs of being generated by a large language model (LLM), suggesting that even advanced hacking tools are becoming more accessible. This development could lower the barrier for entry into mobile exploits, allowing a wider range of attackers to utilize these capabilities.

Tactics & Techniques

DarkSword operates by first compromising Apple's WebKit, then leveraging WebGPU to execute sandbox escapes. This method allows attackers to bypass security measures and gain deeper access to devices. The research indicates that the attackers may not exhibit the high level of operational security typically associated with seasoned Russian threat actors, as evidenced by the lack of obfuscation in their code.

The motivations behind these attacks are complex. While financial gain is a clear objective, there is also a possibility that the attacks serve broader espionage goals, particularly against targets in regions like Ukraine, Saudi Arabia, Turkey, and Malaysia. This duality of purpose complicates the response strategies for potential victims.

Defensive Measures

In response to the discovery of DarkSword, Google has been in contact with Apple regarding the vulnerabilities exploited by the kit. Apple has since patched these vulnerabilities, including those in the recent iOS 26.3 update. However, the research emphasizes the need for users to remain vigilant, as the evolving nature of mobile threats poses ongoing risks.

To protect against such threats, users should ensure their devices are updated regularly and be cautious about the applications they install. Awareness of potential phishing attempts and suspicious activity is crucial in safeguarding personal information. As mobile cyberattacks become more prevalent, understanding these threats is vital for maintaining security.

🔒 Pro insight: The emergence of DarkSword signals a troubling trend in mobile cyber espionage, potentially reshaping threat actor tactics and targets.

Original article from

CSCyberScoop· Tim Starks
Read Full Article

Also covered by

SESecurityWeek

‘DarkSword’ iOS Exploit Kit Used by State-Sponsored Hackers, Spyware Vendors

Read Article
THThe Hacker News

TA446 Deploys Leaked DarkSword iOS Exploit Kit in Targeted Spear-Phishing Campaign

Read Article
WIWired Security

Hundreds of Millions of iPhones Can Be Hacked With a New Tool Found in the Wild

Read Article
SESecurity Affairs

Russia-linked APT TA446 uses DarkSword exploit to target iPhone users in phishing wave

Read Article
TETechCrunch Security

Russians caught stealing personal data from Ukrainians with new advanced iPhone hacking tools

Read Article
BLBleepingComputer

New “Darksword” iOS exploit used in infostealer attack on iPhones

Read Article

Related Pings

MEDIUMThreat Intel

Researchers Roast Cybercriminals to Diminish Their Glamour

Researchers are roasting cybercriminals to diminish their glamor. This humorous approach aims to expose their failures and fracture trust within criminal networks. It's a fresh take on cybersecurity, focusing on education and awareness.

The Register Security·
HIGHThreat Intel

Node.js Maintainers Targeted - Sophisticated Social Engineering Scheme

A coordinated social engineering scheme is targeting Node.js developers, risking the integrity of widely used software packages. This alarming trend highlights the need for vigilance in the open-source community.

Cyber Security News·
HIGHThreat Intel

Transparent Tribe Targets India's Startup Ecosystem - New Threat

Acronis reveals that Transparent Tribe is now targeting India's startup sector, especially cybersecurity firms. This shift raises concerns about espionage and data security risks. Startups must bolster their defenses against these sophisticated attacks.

CyberWire Daily·
HIGHThreat Intel

Gaming Industry - High-Stakes Cybersecurity Threats Explained

Cybercriminals are increasingly targeting the gaming industry, driven by financial transactions and sensitive data. As casinos go digital, understanding these threats is vital for operators to safeguard their assets.

Cyber Security News·
HIGHThreat Intel

China-Linked TA416 Targets European Governments with Phishing

TA416, a China-aligned threat actor, is targeting European governments with sophisticated phishing campaigns using PlugX malware. This poses significant risks to diplomatic security. Stay informed to safeguard your organization.

The Hacker News·
HIGHThreat Intel

Spear-Phishing Campaign Neutralizes MFA for Executives

A new spear-phishing campaign is targeting senior executives, neutralizing MFA protections. This poses serious risks to corporate security. Organizations must enhance their defenses against such sophisticated threats.

SC Media·