Close Menu
Tech News VisionTech News Vision
  • Home
  • What’s On
  • Mobile
  • Computers
  • Gadgets
  • Apps
  • Gaming
  • How To
  • More
    • Web Stories
    • Global
    • Press Release

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Trending Now
A Possible US Government iPhone-Hacking Toolkit Is Now in the Hands of Foreign Spies and Criminals

A Possible US Government iPhone-Hacking Toolkit Is Now in the Hands of Foreign Spies and Criminals

3 March 2026
Marathon Confirms Seasonal Resets, Which Means Everyone’s Gear, Contract and Faction Progression, and Player Level Wipe Every Few Months

Marathon Confirms Seasonal Resets, Which Means Everyone’s Gear, Contract and Faction Progression, and Player Level Wipe Every Few Months

3 March 2026
New MacBooks, the iPhone 17E, and more: Everything we know about Apple’s March 2026 announcements

New MacBooks, the iPhone 17E, and more: Everything we know about Apple’s March 2026 announcements

3 March 2026
Facebook X (Twitter) Instagram
  • Privacy
  • Terms
  • Advertise
  • Contact
Facebook X (Twitter) Instagram Pinterest VKontakte
Tech News VisionTech News Vision
  • Home
  • What’s On
  • Mobile
  • Computers
  • Gadgets
  • Apps
  • Gaming
  • How To
  • More
    • Web Stories
    • Global
    • Press Release
Tech News VisionTech News Vision
Home » A Possible US Government iPhone-Hacking Toolkit Is Now in the Hands of Foreign Spies and Criminals
What's On

A Possible US Government iPhone-Hacking Toolkit Is Now in the Hands of Foreign Spies and Criminals

News RoomBy News Room3 March 2026Updated:3 March 2026No Comments
Facebook Twitter Pinterest LinkedIn Tumblr Email
A Possible US Government iPhone-Hacking Toolkit Is Now in the Hands of Foreign Spies and Criminals

Google notes that Apple patched vulnerabilities used by Coruna in the latest versions of its mobile operating system, iOS 26, so its exploitation techniques are only confirmed to work against iOS 13 through 17.2.1. It targets vulnerabilities in Apple’s Webkit framework for browsers, so Safari users on those older versions of iOS would be vulnerable, but there’s no confirmed techniques in the toolkit for targeting Chrome users. Google also notes that Coruna checks if an iOS devices has Apple’s most stringent security setting, known as Lockdown Mode, enabled, and doesn’t attempt to hack it if so.

Despite those limitations, iVerify says Coruna likely infected tens of thousands of phones. The company consulted with a partner that has access to network traffic and counted visits to a command-and-control server for the cybercriminal version of Coruna infecting Chinese-language websites. The volume of those connections suggest, iVerify says, that roughly 42,000 devices may have already been hacked with the toolkit in the for-profit campaign alone.

Just how many other victims Coruna may have hit, including Ukrainians who visited websites infected with the code by the suspected Russian espionage operation, remains unclear. Google declined to comment beyond its published report. Apple did not immediately provide comment on Google or iVerify’s findings.

In iVerify’s analysis of the cybercriminal version of Coruna—it didn’t have access to any of the earlier versions—the company found that the code appeared to have been altered to plant malware on target devices designed to drain cryptocurrency from crypto wallets as well as steal photos and, in some cases, emails. Those additions, however, were “poorly written” compared to the underlying Coruna toolkit, according to iVerify chief product officer Spencer Parker, which he found to be impressively polished and modular.

“My God, these things are very professionally written,” Parker says of the exploits included in Coruna, suggesting that the cruder malware was added by the cybercriminals who later obtained that code.

As for the code modules that suggest Coruna’s origins as a US government toolkit, iVerify’s Cole notes one alternative explanation: It’s possible that Coruna’s code overlaps with the Operation Triangulation malware that Russia pinned on US hackers could be based on Triangulation’s components being picked up and repurposed after they were discovered. But Cole argues that’s unlikely. Many components of Coruna have never been seen before, he points out, and the whole toolkit appears to have been created by a “single author,” as he puts it.

“The framework holds together very well,” says Cole, who previously worked at the NSA, but notes that he’s been out of the government for more than a decade and isn’t basing any findings on his own outdated knowledge of US hacking tools. “It looks like it was written as a whole. It doesn’t look like it was pieced together.”

If Coruna is, in fact, a US hacking toolkit gone rogue, just how it got into foreign and criminal hands remains a mystery. But Cole points to the industry of brokers that may pay tens of millions of dollars for zero-day hacking techniques that they can resell for espionage, cybercrime, or cyberwar. Notably, Peter Williams, an executive of US government contractor Trenchant, was sentenced this month to seven years in prison for selling hacking tools to the Russian zero-day broker Operation Zero from 2022 to 2025. Williams’ sentencing memo notes that Trenchant sold hacking tools to the US intelligence community as well as others in the “Five Eyes” group of English-speaking governments—the US, UK, Australia, Canada and New Zealand—though it’s not clear what specific tools he sold or what devices they targeted.

“These zero-day and exploit brokers tend to be unscrupulous,” says Cole. “They sell to the highest bidder and they double dip. Many don’t have exclusivity arrangements. That’s very likely what happened here.”

“One of these tools ended up in the hands of a non-Western exploit broker, and they sold it to whoever was willing to pay,” Cole concludes. “The genie is out of the bottle.”

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Here’s Why Trump Posted About Iran ‘Stealing’ the 2020 Election Hours After the US Attacked

Here’s Why Trump Posted About Iran ‘Stealing’ the 2020 Election Hours After the US Attacked

3 March 2026
Google brings Android’s desktop mode to Pixel devices

Google brings Android’s desktop mode to Pixel devices

3 March 2026
The Pixel Watch now lets you tap to pay without opening the Wallet app

The Pixel Watch now lets you tap to pay without opening the Wallet app

3 March 2026
New MacBooks, the iPhone 17E, and more: Everything we know about Apple’s March 2026 announcements

New MacBooks, the iPhone 17E, and more: Everything we know about Apple’s March 2026 announcements

3 March 2026
Editors Picks
Highguard to Permanently Shut Down on March 12, Wildlight to Release One Final Update With a New Warden, a New Weapon, Skill Trees, and More

Highguard to Permanently Shut Down on March 12, Wildlight to Release One Final Update With a New Warden, a New Weapon, Skill Trees, and More

3 March 2026
Google brings Android’s desktop mode to Pixel devices

Google brings Android’s desktop mode to Pixel devices

3 March 2026
Tales, Elden Ring Publisher Bandai Namco Teases New RPG Reveal

Tales, Elden Ring Publisher Bandai Namco Teases New RPG Reveal

3 March 2026
The Pixel Watch now lets you tap to pay without opening the Wallet app

The Pixel Watch now lets you tap to pay without opening the Wallet app

3 March 2026

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Trending Now
Tech News Vision
Facebook X (Twitter) Instagram Pinterest Vimeo YouTube
  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact
© 2026 Tech News Vision. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.