Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Nation-State iOS Exploit Kit ‘Coruna’ Found Powering Global Attacks
    Cybersecurity

    Nation-State iOS Exploit Kit ‘Coruna’ Found Powering Global Attacks

    adminBy adminMarch 5, 2026No Comments4 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    iPhone security
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Multiple iOS exploits and five exploit chains have been found in a single exploit kit once used by Russian state actors against Ukrainians.

    Separate reports analyzing the same iOS threat were published on the same day by Google Threat Intelligence Group (GTIG) and iVerify. GTIG first came across the threat in February 2025. It later learned, after discovering the full code, that the developers called the kit Coruna.

    iVerify came across the same exploit kit independently and has spent several weeks conducting its own independent technical analysis. Both reports describe Coruna as an exploit kit containing 23 exploits across five full exploit chains targeting iOS 13 through 17.2.1.

    GTIG says its technical value lies in the more advanced exploits “using non-public exploitation techniques and mitigation bypasses.” iVerify adds that this is the first time mass exploitation against iOS devices has been observed in the public. It describes Coruna as a nation-state grade iOS exploit kit now also in the hands of mass-scale criminal operations.

    This is not fanciful. GTIG’s longer period of tracking confirms sightings initially from a customer of a commercial surveillance vendor, subsequent use of the same kit in watering hole attacks by UNC6353 (a suspected Russian state-sponsored espionage group) against Ukrainian users; and later in a wider campaign by UNC6691 (a financially motivated criminal group operating out of China).

    Coruna is powerful and sophisticated in both purpose and design. But it is not effective against the latest versions of iOS. The easiest defense is to ensure your iPhone is running iOS 17.3 or newer.

    Advertisement. Scroll to continue reading.

    “In instances where an update is not possible, it is recommended that Lockdown Mode be enabled for enhanced security.” But it’s not just for the sake of Lockdown’s enhanced security. GTIG’s code analysis found the kit pulls out of the device if it is in Lockdown Mode, or if the user is in private browsing.

    Coruna may have started life as a surveillance exploit kit, but by the time it reached the Chinese gang, it was heavily focused on financial and bitcoin wallet theft. By late 2025, GTIG found Coruna’s JavaScript framework on fake Chinese websites. A fake WEEX crypto exchange site, for example, attempts to persuade non-iOS visitors to return on an iPhone or iPad device.

    This methodology serves two purposes. Visiting a crypto exchange indicates the visitor’s potential ownership of crypto wallets, while visiting with an iOS device results in immediate delivery of the exploit kit via a hidden iFrame.

    Using this process, GTIG was able to retrieve all the obfuscated exploits, including the ending payloads. GTIG also found the debug version of the exploit kit, leaving all of the exploits in the clear and including their internal code names – which is where it discovered the exploit kit had been named Coruna internally.

    In February of this year, iVerify also found a suspicious website (mxbc-v2[.]tjbjdod[.]cn), and discovered a page hosting a set of exploits. It extracted as much of the exploits and implants as it could. “The obtained 1-click exploit chain consists of Remote Code Execution (RCE) in Safari and a Local Privilege Escalation (LPE) exploit allowing attackers to take control over infected devices,” it reports.

    At this stage, iVerify called the exploit kit CryptoWaters since it contained a set of modules targeted at cryptocurrency wallets and deployed as a waterhole attack. This was the same attack methodology used by the Russian actors against Ukrainian users. The fake WEEX site discovered by GTIG was likely one of these waterhole sites, but the kit is no longer targeted at Ukrainians – rather at anyone and everyone using an iOS device.

    Further analysis of this exploit kit is ongoing by both iVerify and GTIG, and both firms intend to publish more details in the future. For now, the most complete understanding outside of the researchers themselves is likely to come from combining the insights from these two firms.

    Both reports provide lengthy and different lists of IOCs.

    Related: Apple Patches iOS Zero-Day Exploited in ‘Extremely Sophisticated Attack’

    Related: New ‘ZeroDayRAT’ Spyware Kit Enables Total Compromise of iOS, Android Devices

    Related: Apple Updates iOS and macOS to Prevent Malicious Font Attacks

    Related: Apple Rolls Out iOS 26, macOS Tahoe 26 With Patches for Over 50 Vulnerabilities

    attacks Coruna exploit Global iOS kit NationState powering
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleAre your PPC ads still authentic in the age of AI creative?
    Next Article Give your Meta Quest a hand tracking upgrade with this hidden setting
    admin
    • Website

    Related Posts

    Beazley Exposure Management platform identifies external exposures and prioritizes cyber risk

    March 5, 2026

    Mail2Shell zero-click attack lets hackers hijack FreeScout mail servers

    March 5, 2026

    Webinar: The True State of Security 2026: Why Imbalance is Your Organization’s Biggest Threat

    March 5, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Beazley Exposure Management platform identifies external exposures and prioritizes cyber risk

    March 5, 2026

    Why Most Enterprise SEO Operating Models Are Structurally Broken

    March 5, 2026

    Zank Remote – Android, Fire TV 20.3.0 APK Download by zank

    March 5, 2026

    Mail2Shell zero-click attack lets hackers hijack FreeScout mail servers

    March 5, 2026
    Categories
    • Blogging (33)
    • Cybersecurity (611)
    • Privacy & Online Earning (91)
    • SEO & Digital Marketing (386)
    • Tech Tools & Mobile / Apps (748)
    • WiFi / Internet & Networking (108)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Beazley Exposure Management platform identifies external exposures and prioritizes cyber risk

    March 5, 2026

    Why Most Enterprise SEO Operating Models Are Structurally Broken

    March 5, 2026

    Zank Remote – Android, Fire TV 20.3.0 APK Download by zank

    March 5, 2026
    Most Popular
    • Beazley Exposure Management platform identifies external exposures and prioritizes cyber risk
    • Why Most Enterprise SEO Operating Models Are Structurally Broken
    • Zank Remote – Android, Fire TV 20.3.0 APK Download by zank
    • Mail2Shell zero-click attack lets hackers hijack FreeScout mail servers
    • Give your Meta Quest a hand tracking upgrade with this hidden setting
    • Nation-State iOS Exploit Kit ‘Coruna’ Found Powering Global Attacks
    • Are your PPC ads still authentic in the age of AI creative?
    • Someone tried an entirely vibe-coded operating system, and it wasn’t great
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.