Close Menu
Tech News VisionTech News Vision
  • Home
  • What’s On
  • Mobile
  • Computers
  • Gadgets
  • Apps
  • Gaming
  • How To
  • More
    • Web Stories
    • Global
    • Press Release

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Trending Now
Rockstar Games says hack will have ‘no impact’

Rockstar Games says hack will have ‘no impact’

12 April 2026
You can save  on Super Mario Galaxy games when you buy a Nintendo Switch 2

You can save $20 on Super Mario Galaxy games when you buy a Nintendo Switch 2

12 April 2026
Western Electric 500: How AT&T created the most iconic phone ever

Western Electric 500: How AT&T created the most iconic phone ever

12 April 2026
Facebook X (Twitter) Instagram
  • Privacy
  • Terms
  • Advertise
  • Contact
Facebook X (Twitter) Instagram Pinterest VKontakte
Tech News VisionTech News Vision
  • Home
  • What’s On
  • Mobile
  • Computers
  • Gadgets
  • Apps
  • Gaming
  • How To
  • More
    • Web Stories
    • Global
    • Press Release
Tech News VisionTech News Vision
Home » A Possible US Government iPhone-Hacking Toolkit Is Now in the Hands of Foreign Spies and Criminals
What's On

A Possible US Government iPhone-Hacking Toolkit Is Now in the Hands of Foreign Spies and Criminals

News RoomBy News Room3 March 2026Updated:3 March 2026No Comments
Facebook Twitter Pinterest LinkedIn Tumblr Email
A Possible US Government iPhone-Hacking Toolkit Is Now in the Hands of Foreign Spies and Criminals

Google notes that Apple patched vulnerabilities used by Coruna in the latest versions of its mobile operating system, iOS 26, so its exploitation techniques are only confirmed to work against iOS 13 through 17.2.1. It targets vulnerabilities in Apple’s Webkit framework for browsers, so Safari users on those older versions of iOS would be vulnerable, but there’s no confirmed techniques in the toolkit for targeting Chrome users. Google also notes that Coruna checks if an iOS devices has Apple’s most stringent security setting, known as Lockdown Mode, enabled, and doesn’t attempt to hack it if so.

Despite those limitations, iVerify says Coruna likely infected tens of thousands of phones. The company consulted with a partner that has access to network traffic and counted visits to a command-and-control server for the cybercriminal version of Coruna infecting Chinese-language websites. The volume of those connections suggest, iVerify says, that roughly 42,000 devices may have already been hacked with the toolkit in the for-profit campaign alone.

Just how many other victims Coruna may have hit, including Ukrainians who visited websites infected with the code by the suspected Russian espionage operation, remains unclear. Google declined to comment beyond its published report. Apple did not immediately provide comment on Google or iVerify’s findings.

In iVerify’s analysis of the cybercriminal version of Coruna—it didn’t have access to any of the earlier versions—the company found that the code appeared to have been altered to plant malware on target devices designed to drain cryptocurrency from crypto wallets as well as steal photos and, in some cases, emails. Those additions, however, were “poorly written” compared to the underlying Coruna toolkit, according to iVerify chief product officer Spencer Parker, which he found to be impressively polished and modular.

“My God, these things are very professionally written,” Parker says of the exploits included in Coruna, suggesting that the cruder malware was added by the cybercriminals who later obtained that code.

As for the code modules that suggest Coruna’s origins as a US government toolkit, iVerify’s Cole notes one alternative explanation: It’s possible that Coruna’s code overlaps with the Operation Triangulation malware that Russia pinned on US hackers could be based on Triangulation’s components being picked up and repurposed after they were discovered. But Cole argues that’s unlikely. Many components of Coruna have never been seen before, he points out, and the whole toolkit appears to have been created by a “single author,” as he puts it.

“The framework holds together very well,” says Cole, who previously worked at the NSA, but notes that he’s been out of the government for more than a decade and isn’t basing any findings on his own outdated knowledge of US hacking tools. “It looks like it was written as a whole. It doesn’t look like it was pieced together.”

If Coruna is, in fact, a US hacking toolkit gone rogue, just how it got into foreign and criminal hands remains a mystery. But Cole points to the industry of brokers that may pay tens of millions of dollars for zero-day hacking techniques that they can resell for espionage, cybercrime, or cyberwar. Notably, Peter Williams, an executive of US government contractor Trenchant, was sentenced this month to seven years in prison for selling hacking tools to the Russian zero-day broker Operation Zero from 2022 to 2025. Williams’ sentencing memo notes that Trenchant sold hacking tools to the US intelligence community as well as others in the “Five Eyes” group of English-speaking governments—the US, UK, Australia, Canada and New Zealand—though it’s not clear what specific tools he sold or what devices they targeted.

“These zero-day and exploit brokers tend to be unscrupulous,” says Cole. “They sell to the highest bidder and they double dip. Many don’t have exclusivity arrangements. That’s very likely what happened here.”

“One of these tools ended up in the hands of a non-Western exploit broker, and they sold it to whoever was willing to pay,” Cole concludes. “The genie is out of the bottle.”

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Huawei beats Apple and Samsung with new wide foldable

Huawei beats Apple and Samsung with new wide foldable

13 April 2026
Rockstar Games says hack will have ‘no impact’

Rockstar Games says hack will have ‘no impact’

12 April 2026
You can save  on Super Mario Galaxy games when you buy a Nintendo Switch 2

You can save $20 on Super Mario Galaxy games when you buy a Nintendo Switch 2

12 April 2026
Western Electric 500: How AT&T created the most iconic phone ever

Western Electric 500: How AT&T created the most iconic phone ever

12 April 2026
Editors Picks
Invincible VS Beta Players Hope to See Penalties for Rage Quitting at Launch

Invincible VS Beta Players Hope to See Penalties for Rage Quitting at Launch

13 April 2026
Pete Hines Talks About the Changes at Bethesda That Led to His Retirement

Pete Hines Talks About the Changes at Bethesda That Led to His Retirement

12 April 2026
Kojima Productions Reportedly Casting Villain for Physint

Kojima Productions Reportedly Casting Villain for Physint

12 April 2026
Aang, The Last Airbender Movie Leak Allegedly Reveals 3 Minutes of Footage

Aang, The Last Airbender Movie Leak Allegedly Reveals 3 Minutes of Footage

12 April 2026

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Trending Now
Tech News Vision
Facebook X (Twitter) Instagram Pinterest Vimeo YouTube
  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact
© 2026 Tech News Vision. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.