Widespread Hacking Operation Aims at iPhone Users in Ukraine and China with Tools from U.S. Military Contractor

Try Our Free Tools!
Master the web with Free Tools that work as hard as you do. From Text Analysis to Website Management, we empower your digital journey with expert guidance and free, powerful tools.

Alarming Cybersecurity Breach: Hacking Campaign Targets iPhone Users in Ukraine and China

A pervasive hacking initiative, primarily aimed at iPhone users in Ukraine and China, has triggered significant concern within the cybersecurity sector.

Revelations indicate that the sophisticated tools employed in these assaults may trace back to the U.S. military contractor L3Harris.

Originally fashioned for Western intelligence operations, these advanced hacking instruments appear to have been appropriated by numerous entities, including Russian state-affiliated hackers and Chinese cybercriminals.

Recent investigative efforts by Google have revealed that during 2025, an advanced iPhone hacking toolkit dubbed “Coruna” was weaponized in a series of global cyber offensives.

Comprising 23 intricate components, this toolkit was first deployed in targeted missions by an undisclosed surveillance vendor’s government client.

Over time, its capabilities were seized by Russian operatives, who directed their attention toward a select group of Ukrainians, subsequently leading to its exploitation by Chinese hackers engaging in various monetary cybercriminal enterprises.

Insights from iVerify, a mobile cybersecurity firm that undertook an independent examination of the Coruna toolkit, propose that it was likely crafted by a corporation servicing the U.S. government.

Former employees from L3Harris disclosed that a portion of Coruna was born within the company’s hacking and surveillance technology division, Trenchant.

Reflecting on internal knowledge of the tool’s architecture, one former employee remarked, “Coruna was undeniably an internal nomenclature for a component.”

L3Harris’s Trenchant division exclusively markets its hacking and surveillance technologies to the U.S. government and its allies in the Five Eyes intelligence alliance, which encompasses Canada, Australia, New Zealand, and the United Kingdom.

Such a constrained clientele ominously implies that Coruna may have initially been acquired and utilized by a foreign intelligence agency before its eventual misappropriation; however, the extent of L3Harris’s contribution to the toolkit remains nebulous. Efforts to obtain comments from L3Harris have yielded no responses.

The exact pathway through which Coruna migrated from contractor use to Russian and subsequently Chinese hackers remains ambiguous.

Nevertheless, parallels have been drawn with the case of Peter Williams, a former Trenchant manager recently convicted for selling eight hacking tools to a Russian firm, Operation Zero, for a significant sum.

The instruments procured from Williams are believed to facilitate access to a multitude of devices globally, including iOS systems, raising grave concerns due to the potential repercussions of their distribution.

Operation Zero, purportedly working in close concert with Russian governmental interests, has faced U.S. sanctions following allegations of selling leaked tools to unauthorized entities.

This corridor of cybercriminal exchange may elucidate how the Russian espionage faction, referred to by Google as UNC6353, acquired Coruna, deploying it on compromised Ukrainian websites to conduct remote hacks on targeted iPhone users.

Once the toolkit reached Russian hackers, it may have transited further, potentially through various cybercriminal brokers or factions, ultimately culminating in its usage by Chinese operatives engaged in expansive cyber campaigns. U.S. prosecutors have underscored the involvement of actors from the Trickbot ransomware gang, linking them to Operation Zero.

Google’s researchers have identified two specific Coruna exploits—referred to as Photon and Gallium—in association with a cyber initiative dubbed Operation Triangulation, which allegedly targets Russian iPhone users.

Although previously uncovered by Kaspersky in 2023, researchers continue to grapple with definitively associating it with known hacking entities or exploit development firms.

Notably, the exploits utilized by both Coruna and Triangulation exhibit remarkable similarities, hinting at a potential shared origin.

Coruna is primarily designed to infiltrate iOS devices, with compatibility extending to versions 13 through 17.2.1.

Such timelines converge with the leaks attributed to Williams and the emergence of Operation Triangulation, implying that further revelations in this domain are likely imminent.

Security analysts have observed that distinct characteristics of the tools—including the use of avian nomenclature for certain components—suggest a possible lineage or influence from Trenchant’s prior development endeavors.

A person holds a smartphone with a lock icon in front of multiple computer screens displaying code in a server room.

The ramifications of this hacking toolkit incident intensify apprehensions regarding the susceptibility of government-commissioned instruments to potentially falling into nefarious hands.

As the cybersecurity landscape transforms, the accountability and governance of such potent software demand increased vigilance to thwart misuse that poses threats to global security and individual privacy.

Source link: News.ssbcrack.com.

Disclosure: This article is for general information only and is based on publicly available sources. We aim for accuracy but can't guarantee it. The views expressed are the author's and may not reflect those of the publication. Some content was created with help from AI and reviewed by a human for clarity and accuracy. We value transparency and encourage readers to verify important details. This article may include affiliate links. If you buy something through them, we may earn a small commission — at no extra cost to you. All information is carefully selected and reviewed to ensure it's helpful and trustworthy.

Reported By

Neil Hemmings

I'm Neil Hemmings from Anaheim, CA, with an Associate of Science in Computer Science from Diablo Valley College. As Senior Tech Associate and Content Manager at RS Web Solutions, I write about AI, gadgets, cybersecurity, and apps – sharing hands-on reviews, tutorials, and practical tech insights.
Share the Love
Related News Worth Reading