Report: U.S. Firm Developed iPhone Cyberattack Software Utilized by China and Russia

Try Our Free Tools!
Master the web with Free Tools that work as hard as you do. From Text Analysis to Website Management, we empower your digital journey with expert guidance and free, powerful tools.

Google Uncovers Covert Hacking Campaign: “Coruna”

In a recent revelation, Google exposed a sophisticated hacking initiative known as “Coruna,” which primarily targets unprotected iPhone devices running on iOS versions from 13.0 to 17.2.1.

This nefarious operation utilizes ingenious techniques to circumvent built-in security measures, surreptitiously accessing devices to deploy harmful payloads without user awareness.

A recent article from TechCrunch indicates that elements of Coruna may have been partially developed by Trenchant, the hacking and surveillance technology sector of L3Harris, a prominent American defense contractor.

According to confidential sources within the company, the term “Coruna” indeed referred to an internal component at L3Harris, corroborating suspicions of its origins.

Insights shared by one individual highlighted striking similarities between the technical attributes of the component and research findings from Google.

Furthermore, TechCrunch disclosed that the toolkit embodied in Coruna had wider applications; it was utilized by L3Harris in various operations.

Notably, one such endeavor involved Russian state-sponsored hackers who directed their efforts toward a limited demographic of Ukrainian targets using compromised digital platforms.

Subsequently, elements of the same toolkit were appropriated by Chinese cybercriminals, who employed them in extensive assaults aimed at pilfering funds and cryptocurrency.

These attacks encompassed phishing tactics and malware proliferation designed to exploit vulnerabilities in financial infrastructure.

Coruna’s functionality included sophisticated scanning of images for QR codes, meticulously combing through text for cryptocurrency seed phrases and keywords such as “backup phrase,” and transmitting this sensitive information to remote command-and-control servers. The operation also extended to accessing emails and other confidential data repositories.

The mobile security firm iVerify estimates that this exploitative venture may have compromised approximately 42,000 devices, as inferred from the traffic directed towards the attackers’ servers.

A former executive with Trenchant provided potential insight into Coruna’s genesis. In a scandal that surfaced in 2025, Peter Williams, an Australian executive overseeing segments of the hacking division, admitted guilt concerning the embezzlement of various cyber-exploitation tools, which he subsequently sold to Operation Zero, a Russian intermediary dealing in zero-day exploits.

U.S. prosecutors alleged that Williams had “full access” to internal networks and managed to sell eight hacking tools for a sum nearing $1.3 million, earning him a seven-year prison sentence.

Authorities cautioned that the software could potentially empower adversaries to breach “millions of computers and devices globally.”

Security experts now express concern that this leak may have significantly exacerbated the proliferation of Coruna within a vast ecosystem comprising brokers, governments, and cybercriminal collectives, potentially inciting further cyber assaults and exploitation of susceptible systems on a global scale.

Global Market for Manufacturing Operations Management Software Projected to Reach $69.8 Billion by 2032

This iPhone Hack Has Been Stealing Crypto From Users — Here’s How to Stay Safe

Referred to as “Coruna,” this exploit toolkit seemingly originated from a government-linked surveillance operation focused on Russian espionage.

Source link: Techloy.com.

Disclosure: This article is for general information only and is based on publicly available sources. We aim for accuracy but can't guarantee it. The views expressed are the author's and may not reflect those of the publication. Some content was created with help from AI and reviewed by a human for clarity and accuracy. We value transparency and encourage readers to verify important details. This article may include affiliate links. If you buy something through them, we may earn a small commission — at no extra cost to you. All information is carefully selected and reviewed to ensure it's helpful and trustworthy.

Reported By

Neil Hemmings

I'm Neil Hemmings from Anaheim, CA, with an Associate of Science in Computer Science from Diablo Valley College. As Senior Tech Associate and Content Manager at RS Web Solutions, I write about AI, gadgets, cybersecurity, and apps – sharing hands-on reviews, tutorials, and practical tech insights.
Share the Love
Related News Worth Reading