Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124

A common assumption among iPhone security experts was that finding vulnerabilities and developing exploits for iOS was difficult, requiring a lot of time, resources, and teams of skilled researchers to penetrate layers of security defenses. This means iPhone Spyware and Zero-day vulnerabilitieswhich the software vendor did not know before exploiting it, was rare and used only in limited and targeted attacks, As Apple itself says.
But last month, cybersecurity researchers at Google, iVerify, and Lookout documented several large-scale hacking campaigns using tools known as crown and DarkSwordwhich was almost randomly targeting victims around the world who were not yet using Apple’s latest software. The hackers behind these attacks include Russian spies and Chinese cybercriminals, and they target their victims via hacked websites or fake pages, allowing them to steal phone data from a large number of victims.
Now, some of these tools have leaked onlineAllowing anyone to take the code and easily launch their own attacks against Apple users running older versions of iOS.
Apple has invested significant resources in new security and development technologies, such as introducing memory-safe code for the latest iPhone models Launch features such as lock mode Specifically to counter potential spyware attacks. The goal was to make modern iPhones more secure, and reinforce the claim that the iPhone is very difficult to hack.
But there are still plenty of older iPhones out there that are now easier targets for spies and cybercriminals using spyware.
There are now two basic security categories for iPhone users.
Users running the latest iOS 26 running on the latest iPhone 17 models released in 2025 will enjoy A new security feature called Memory Integrity Enforcementwhich is designed to stop memory corruption errors, one of the most commonly exploited flaws used in spyware attacks and phone unlocking. DarkSword relied heavily on memory corruption bugs, According to Google.
Then there iPhone users Who are still running the previous version of Apple’s mobile software, iOS 18, or even older versions, which were vulnerable to memory-based hacks and other exploits in the past.
Do you have more information about DarkSword, Coruna, or other government hacking and spyware tools? From a non-work device, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, via Telegram, Keybase, Wire @lorenzofb, or By email.
The Coruna and DarkSword discovery suggests that memory-based attacks could continue to infect users of older iPhones and iPads that lag behind newer, more memory-secure models.
Experts at iVerify and Lookout, two cybersecurity companies with a commercial stake in selling mobile security products, say Coruna and DarkSword may also challenge the long-held assumption that iPhone hacks are rare.
iVerify co-founder Matthias Frelingsdorff told TechCrunch that attacks on mobile devices are now “widespread,” but he also said that zero-day attacks against the latest software “will always have high prices,” implying that they will not be used to hack people on a large scale.
One problem is that people describe attacks against iPhones as rare or sophisticated simply because they are rarely documented, said Patrick Wardle, a security expert at Apple. But he said the reality is that these attacks may exist but are not always detected.
“Calling it ‘highly advanced’ is a bit like calling tanks or advanced missiles,” Wardle told TechCrunch. “This is true, but it misses the point. This is simply the basic capability at this level, and all (most) countries have it (or can get it at the right price).”
Another issue highlighted by Coruna and DarkSword is that there is now a seemingly thriving “second-hand” market, creating a financial incentive for “individual exploit developers and middlemen to get paid twice for the same exploit,” according to Justin Albrecht, principal researcher at Lookout.
Especially when the initial vulnerability is patched, it makes sense for brokers to resell it before everyone else updates.
“This is not a one-time event, but rather a sign of things to come,” Albrecht told TechCrunch.