Coruna iPhone Exploit Toolkit Disclosed to Cybercriminals

Try Our Free Tools!
Master the web with Free Tools that work as hard as you do. From Text Analysis to Website Management, we empower your digital journey with expert guidance and free, powerful tools.

Cybersecurity Experts Unearth Illicit iPhone Hacking Tools

A consortium of cybersecurity professionals has identified a suite of potent iPhone hacking instruments, originally believed to be government-developed, which have now unfortunately crossed into the possession of cybercriminals.

This revelation highlights the significant hazards posed by the leakage of specialist tools and their proliferation within the black market for nefarious financial objectives.

Initial reports indicate that an exploit toolkit dubbed “Coruna” surfaced in February 2025, during a covert operation by an espionage firm attempting to infiltrate a mobile device on behalf of an official client.

Subsequently, the Coruna toolkit was implicated in a sweeping offensive against users in Ukraine, followed by its detection among malevolent entities in China driven by mercenary motives.

The exact mechanism by which these tools were disseminated remains obscure. Nevertheless, experts caution against the burgeoning marketplace for “used” exploits that cybercriminals leverage to maximize financial gain by exploiting well-known vulnerabilities.

Furthermore, this finding illustrates a concerning trend: exploits and “backdoors” engineered for governmental use can extricate themselves from official domains, ultimately falling into the hands of cybercriminals or other non-state actors.

The cybersecurity firm iVerify has connected Coruna to U.S. government technologies, drawing on resemblances with tools previously ascribed to those state entities.

The more extensively this tool is employed, the higher the probability of a leak.– iVerify

Experts assert that Coruna possesses the capability to compromise an iPhone through five distinct vectors, employing a total of 23 vulnerabilities from its digital arsenal. Affected models include iPhones operating on iOS versions 13 through 17.2.1, which was released in December 2023.

Additionally, analysts have noted that earlier operations employed components bearing similarities to those used in the now-defunct Triangulation project.

Reports from 2023 have indicated that the U.S. government allegedly endeavored to breach several iPhones belonging to personnel associated with a private cybersecurity initiative tied to a defense contractor.

Context and Security Implications

While occurrences of cyber tool leaks are infrequent, they are far from unprecedented. Historical incidents have demonstrated how swiftly robust hacking instruments can migrate into the hands of criminals intent on exploitation or harm.

A hooded figure at a laptop with a question mark over their face, set against a backdrop of digital numbers.

Media sources have recounted cases involving the former head of L3Harris Trenchant, who received a prison sentence exceeding seven years for the theft and sale of eight exploits to a broker affiliated with the Russian government.

Prosecutors allege that these exploits enabled attacks on millions of devices globally; however, it remains unclear whether these tools were subsequently patched by manufacturers or misused.

Source link: Mezha.net.

Disclosure: This article is for general information only and is based on publicly available sources. We aim for accuracy but can't guarantee it. The views expressed are the author's and may not reflect those of the publication. Some content was created with help from AI and reviewed by a human for clarity and accuracy. We value transparency and encourage readers to verify important details. This article may include affiliate links. If you buy something through them, we may earn a small commission — at no extra cost to you. All information is carefully selected and reviewed to ensure it's helpful and trustworthy.

Reported By

Neil Hemmings

I'm Neil Hemmings from Anaheim, CA, with an Associate of Science in Computer Science from Diablo Valley College. As Senior Tech Associate and Content Manager at RS Web Solutions, I write about AI, gadgets, cybersecurity, and apps – sharing hands-on reviews, tutorials, and practical tech insights.
Share the Love
Related News Worth Reading