Researchers Expose DarkSword, an iPhone Exploit Chain Targeting Millions of Devices
DarkSword uses six vulnerabilities to steal sensitive data from up to 270 million iPhones running older iOS 18.x versions, researchers said.
- On March 18, researchers at Google, iVerify and Lookout disclosed that Darksword was planted on dozens of Ukrainian websites, capable of instantly hacking iPhones, marking the second spyware discovery this month.
- Researchers found the exploit targeted iPhones running iOS versions 18.4 to 18.6.2, released by Apple between March and August 2025, with an estimated 220 million to 270 million iPhones still exposed.
- Lookout and iVerify reported Darksword steals passwords, messages, photos, browser history, Calendar, Notes, Health data, and cryptocurrency from wallet apps using fileless techniques with dwell time measured in minutes.
- Apple blocked the identified malicious domains in Apple Safe Browsing and an Apple spokesperson said exploits targeted 'out-of-date software', urging users to update.
- Researchers cautioned that UNC6353 used Darksword and Coruna toolkit across campaigns in Saudi Arabia, Turkey and Malaysia, revealing a flourishing spyware ecosystem this month.
97 Articles
97 Articles
New iPhone spyware Darksword spread through hacked websites, putting millions at risk
The discovery, announced Wednesday in coordinated reports from Lookout, iVerify, and Google's Threat Analysis Group, highlights a growing trade in high-end spyware once found mostly in state-backed espionage. Darksword marks the second iOS-targeting exploit uncovered this month, following the earlier disclosure of a separate tool known as Coruna. Both were...Read Entire Article
Researchers uncover iPhone spyware capable of penetrating millions of devices
A powerful software exploit capable of penetrating and stealing information from potentially hundreds of millions of Apple iPhones was planted on dozens of websites in Ukraine in recent weeks.
Darksword was created to infect devices, steal information and quickly disappear.
Mainly exploited by Russian state hackers, all it takes is visiting an infected website and all personal data, passwords, messages and photos can be stolen from your phone in minutes.
Coverage Details
Bias Distribution
- 46% of the sources are Center
Factuality
To view factuality data please Upgrade to Premium


























