Google Alerts Users About Crypto Scams Employing Advanced iPhone Exploit Toolkit

Try Our Free Tools!
Master the web with Free Tools that work as hard as you do. From Text Analysis to Website Management, we empower your digital journey with expert guidance and free, powerful tools.

New Exploit Kit Discovered Targeting iPhone Users

Threat analysts at Google have identified a recently unveiled exploit kit specifically aimed at Apple iPhone users, with the primary intention of pilfering cryptocurrency wallet seed phrases.

Dubbed “Coruna” by its creators, this kit is engineered to target iPhones operating on iOS versions ranging from 13.0 to 17.2.1.

It encompasses “five comprehensive iOS exploit chains along with a total of 23 exploits,” several of which remain previously undisclosed, as reported by the Google Threat Intelligence Group (GTIG) earlier this week.

The discovery of this exploit kit was first made in February 2025, and the GTIG has since observed its deployment by a suspected Russian espionage group against Ukrainian entities.

Additionally, instances have emerged implicating the kit on counterfeit Chinese cryptocurrency websites designed for illicit information extraction.

According to GTIG, the exploit kit is ineffective against the latest iOS version; thus, it strongly urges iPhone users to ensure their devices are updated with the most current software.

In cases where upgrading is unfeasible, users should activate the “Lockdown Mode,” a measure advised by Apple to thwart advanced attacks.

Kit Exploits Cryptocurrency Through Deceptive Websites

In its analysis, GTIG discovered components of an iOS exploit in February 2025, wherein a client of a surveillance enterprise utilized JavaScript to fingerprint devices, subsequently delivering the pertinent exploit.

Later that year, identical JavaScript frameworks were detected across numerous compromised Ukrainian websites, which only served to selected iPhone users based on specific geolocations.

Subsequently, the GTIG reported finding the same framework in December on an extensive array of fraudulent Chinese websites, predominantly concerning financial transactions, including a site mimicking the cryptocurrency exchange WEEX.

When users navigate these websites using iOS devices, the framework deploys the exploit kit, scouring for financial data, notably scrutinizing messages that contain seed phrases or keywords like “backup phrase” and “bank account.”

The Coruna kit further seeks out popular cryptocurrency applications, including Uniswap and MetaMask, in its relentless pursuit of sensitive information.

Debate Over Coruna’s Possible US Intelligence Origins

Notably, GTIG refrained from identifying the surveillance company client from which the exploit kit purportedly originated. However, mobile security firm iVerify suggested to WIRED that it may have been developed or acquired by the US government.

“It’s exceptionally sophisticated, requiring millions of dollars to create, and shows resemblance to other modules publicly attributed to entities within the US government,” remarked iVerify co-founder Rocky Cole to WIRED.

“This marks the inaugural instance we’ve seen of what is likely US government tools—based on our analysis of the code—spiraling out of control and falling into the hands of both adversaries and cybercriminal factions.”

Kaspersky Report: 76% of Individuals in Egypt Utilize Cybersecurity Solutions

Conversely, a principal security researcher from Kaspersky informed The Register that their analysis found “no substantial evidence of actual code reuse in the reports available for attributing Coruna to the same developers.”

Source link: Tradingview.com.

Disclosure: This article is for general information only and is based on publicly available sources. We aim for accuracy but can't guarantee it. The views expressed are the author's and may not reflect those of the publication. Some content was created with help from AI and reviewed by a human for clarity and accuracy. We value transparency and encourage readers to verify important details. This article may include affiliate links. If you buy something through them, we may earn a small commission — at no extra cost to you. All information is carefully selected and reviewed to ensure it's helpful and trustworthy.

Reported By

RS Web Solutions

We provide the best tutorials, reviews, and recommendations on all technology and open-source web-related topics. Surf our site to extend your knowledge base on the latest web trends.
Share the Love
Related News Worth Reading