{"id":106700,"date":"2026-03-04T10:08:43","date_gmt":"2026-03-04T10:08:43","guid":{"rendered":"https:\/\/neclink.com\/index.php\/2026\/03\/04\/a-suite-of-government-hacking-tools-targeting-iphones-is-now-being-used-by-cybercriminals\/"},"modified":"2026-03-04T10:08:43","modified_gmt":"2026-03-04T10:08:43","slug":"a-suite-of-government-hacking-tools-targeting-iphones-is-now-being-used-by-cybercriminals","status":"publish","type":"post","link":"https:\/\/neclink.com\/index.php\/2026\/03\/04\/a-suite-of-government-hacking-tools-targeting-iphones-is-now-being-used-by-cybercriminals\/","title":{"rendered":"A suite of government hacking tools targeting iPhones is now being used by cybercriminals"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p id=\"speakable-summary\" class=\"wp-block-paragraph\">Security researchers have identified a suite of powerful hacking tools capable of compromising iPhones running older software that they say has passed from a government customer into the hands of cybercriminals.<\/p>\n<p class=\"wp-block-paragraph\">Google <a href=\"https:\/\/cloud.google.com\/blog\/topics\/threat-intelligence\/coruna-powerful-ios-exploit-kit\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">said Tuesday<\/a> that it first identified the exploit kit, dubbed Coruna, in February 2025 during a <a href=\"https:\/\/techcrunch.com\/2025\/04\/25\/techcrunch-reference-guide-to-security-terminology\/#spyware-commercial-government\" target=\"_blank\" rel=\"noreferrer noopener\">surveillance vendor\u2019s attempt<\/a> to hack into someone\u2019s phone with spyware on behalf of a government customer. It found the same exploit kit months later targeting Ukrainian users in a broad-scale campaign by a Russian espionage group, and then later found it used by a financially motivated hacker in China.<\/p>\n<p class=\"wp-block-paragraph\">It\u2019s unclear how the tools leaked or proliferated, but Google security researchers warned of an emerging market for \u201csecondhand\u201d exploits, which are sold to hackers motivated by money to extract more value out of the exploit.<\/p>\n<p class=\"wp-block-paragraph\">The discovery also shows how exploits and back doors designed to be used by governments can leak and ultimately be abused by cybercriminals or other non-state actors. Mobile security company iVerify obtained and reverse-engineered the hacking tools, saying <a href=\"https:\/\/iverify.io\/press-releases\/first-known-mass-ios-attack\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">in a blog post<\/a> that it linked the Coruna exploit kit to the U.S. government, based on similarities to hacking tools previously attributed to the United States.<\/p>\n<p class=\"wp-block-paragraph\">\u201cThe more widespread the use, the more certain a leak will occur,\u201d said iVerify. \u201cWhile iVerify has some evidence that this tool is a leaked US government framework, that shouldn\u2019t overshadow the knowledge that these tools will find their way into the wild and will be used unscrupulously by bad actors.\u201d<\/p>\n<p class=\"wp-block-paragraph\">Google said the hacking tools are powerful, as they can bypass an iPhone\u2019s defenses simply through visiting a malicious website containing the exploit code \u2014\u00a0such as being sent a malicious link \u2014 in what is known as a \u201cwatering hole\u201d attack. According to Google, the Coruna kit can hack into an iPhone five separate ways by relying on and chaining together 23 separate vulnerabilities in its digital arsenal. Affected devices range from iPhone models running iOS 13 up to 17.2.1, which released in December 2023.<\/p>\n<p class=\"wp-block-paragraph\">According to Wired, which <a href=\"https:\/\/www.wired.com\/story\/coruna-iphone-hacking-toolkit-us-government\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">first reported the news<\/a>, the Coruna kit contains components that were previously used in a hacking <a href=\"https:\/\/techcrunch.com\/2023\/06\/01\/kaspersky-says-attackers-hacked-staff-iphones-with-unknown-malware\/\" target=\"_blank\" rel=\"noreferrer noopener\">campaign dubbed Operation Triangulation<\/a>. Russian cybersecurity firm Kaspersky claimed in 2023 that the U.S. government tried to hack several iPhones belonging to its employees.<\/p>\n<div class=\"wp-block-techcrunch-inline-cta\">\n<div class=\"inline-cta__wrapper\">\n<p>Techcrunch event<\/p>\n<div class=\"inline-cta__content\">\n<p>\n\t\t\t\t\t\t\t\t\t<span class=\"inline-cta__location\">San Francisco, CA<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"inline-cta__separator\">|<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"inline-cta__date\">October 13-15, 2026<\/span>\n\t\t\t\t\t\t\t<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/div>\n<p class=\"wp-block-paragraph\">While leaks of hacking tools are rare, they are not unheard of. In 2017, the U.S. National Security Agency discovered that tools it had developed to hack into Windows computers worldwide had been stolen. The Windows back door, known as EternalBlue, was later published and was used by cybercriminals in <a href=\"https:\/\/techcrunch.com\/2018\/11\/28\/hackers-nsa-eternalblue-exploit-hijack-computers\/\" target=\"_blank\" rel=\"noreferrer noopener\">subsequent attacks<\/a>, including the <a href=\"https:\/\/techcrunch.com\/2019\/07\/08\/the-wannacry-sinkhole\/\" target=\"_blank\" rel=\"noreferrer noopener\">2017 WannaCry ransomware attack<\/a> by North Korea.<\/p>\n<p class=\"wp-block-paragraph\">TechCrunch also recently reported on the case of Peter Williams, the former head of the U.S. defense contractor L3Harris Trenchant, who was sentenced to more than seven years in prison <a href=\"https:\/\/techcrunch.com\/2025\/10\/29\/former-l3harris-trenchant-boss-pleads-guilty-to-selling-zero-day-exploits-to-russian-broker\/\" target=\"_blank\" rel=\"noreferrer noopener\">after pleading guilty<\/a> to stealing and selling eight exploits to a broker known to work with the Russian government.<\/p>\n<p class=\"wp-block-paragraph\">According to prosecutors, Williams sold exploits that were capable of <a href=\"https:\/\/techcrunch.com\/2026\/02\/11\/doj-says-trenchant-boss-sold-exploits-to-russian-broker-capable-of-accessing-millions-of-computers-and-devices\/\" target=\"_blank\" rel=\"noreferrer noopener\">hacking into \u201cmillions of computers and devices\u201d worldwide<\/a>. At least one exploit was <a href=\"https:\/\/techcrunch.com\/2026\/02\/25\/inside-the-story-of-the-us-defense-contractor-who-leaked-hacking-tools-to-russia\/\">sold to a South Korean broker<\/a>. It\u2019s unclear if the exploits were ever disclosed to the software makers, or patched.<\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/techcrunch.com\/2026\/03\/03\/a-suite-of-government-hacking-tools-targeting-iphones-is-now-being-used-by-cybercriminals\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security researchers have identified a suite of powerful hacking tools capable of compromising iPhones running older software that they say has passed from a government<\/p>\n","protected":false},"author":1,"featured_media":106701,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[149],"tags":[],"class_list":["post-106700","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/posts\/106700","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/comments?post=106700"}],"version-history":[{"count":0,"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/posts\/106700\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/media\/106701"}],"wp:attachment":[{"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/media?parent=106700"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/categories?post=106700"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/tags?post=106700"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}