Tag

Darksword

All articles tagged with #darksword

TA446 Expands DarkSword iOS Attacks in Broad Spear-Phishing Campaign
cybersecurity13 days ago

TA446 Expands DarkSword iOS Attacks in Broad Spear-Phishing Campaign

TA446, a Russia-linked threat group, used the DarkSword iOS exploit kit in a targeted spear-phishing operation to deliver the GHOSTBLADE dataminer and the MAYBEROBOT backdoor via password-protected ZIPs; emails spoofed Atlantic Council discussion invites and redirected iPhone users (March 26, 2026) to the exploit kit through decoy PDFs, with server-side filtering guiding iOS browsers to the kit but no sandbox escapes observed. The campaign broadened targets to government, think tanks, higher education, finance, and legal entities, suggesting opportunistic credential harvesting and intel collection. Apple warns users with Lock Screen alerts and urges updates; a leaked DarkSword version on GitHub could democratize the exploit, potentially expanding mobile threats, per researchers.

Apple Flags Active Web Attacks on Older iPhones With Critical Update Alerts
technology14 days ago

Apple Flags Active Web Attacks on Older iPhones With Critical Update Alerts

Apple is sending Lock Screen “Critical Software” alerts to iPhones and iPads running older iOS/iPadOS, warning that attackers are exploiting outdated software (notably via Coruna and DarkSword) and urging users to install a critical update. Patches exist for iOS 15–26 (e.g., iOS 15.8.7 and 16.7.15); Safe Browsing in Safari blocks known malicious domains, and users on older iOS versions should update to receive protections, with Lockdown Mode available on iOS 16+ for those unable to update.

Patch now: DarkSword toolkit pushes urgent iPhone update
technology16 days ago

Patch now: DarkSword toolkit pushes urgent iPhone update

Apple urges iPhone users to update to iOS 26.3+ after the DarkSword hacking toolkit appeared on GitHub, enabling JavaScript-based malware (Ghostblade, Ghostknife) that can steal data, record audio, or reveal location on devices running iOS 18.4–18.7; vulnerabilities are fixed by 26.3 (and 26.3.1), and up-to-date devices are not vulnerable. Update via Settings > General > Software Update, or use Background Security Improvements for immediate patches; GTIG notes the toolkit has been used to target regions including Malaysia, Saudi Arabia, Turkey, and Ukraine.

DarkSword Goes Public: iPhone Data-Stealing Exploit Released
technology17 days ago

DarkSword Goes Public: iPhone Data-Stealing Exploit Released

DarkSword, a web-based iPhone exploit, has been released on GitHub and is reportedly used by Russia-linked groups to compromise iPhones simply by visiting a compromised site; it targets iOS versions 18.4–18.6.2, exfiltrates data quickly, and does not require malware installation. Lookout and iVerify link it to the same infrastructure as earlier campaigns, with Google noting deployment by UNC6353 on Ukrainian government sites. Apple has issued a critical security update and urged users to update or enable Lockdown Mode; devices on older iOS versions should upgrade to newer releases (iOS 15 for 13/14).

Apple urges iPhone users on old iOS to upgrade to 15 to stay safe from hacks
technology22 days ago

Apple urges iPhone users on old iOS to upgrade to 15 to stay safe from hacks

Apple is urging iPhone owners on iOS 13/14 to upgrade to iOS 15+ to guard against Coruna and DarkSword exploit kits that target vulnerabilities in iOS 13–17.2.1; updates released March 11 address these flaws, so iOS 15+ devices are protected, with Safe Browsing in Safari and Lockdown Mode available for extra protection if upgrading isn’t possible.

DarkSword: a fileless iPhone hack targets iOS 18 users
technology-and-electronics22 days ago

DarkSword: a fileless iPhone hack targets iOS 18 users

Researchers reveal a new hack called DarkSword that can instantly access data on iPhones running iOS 18.4–18.6.2 simply by visiting a malicious webpage. It’s a fileless attack that can grab sensitive data (including messages, iCloud content, and crypto wallets) and then erase itself. Apple has patched related flaws in newer iOS releases (26 and 18.7) and recommends updating; Safari’s Safe Browsing can block some of the malicious URLs. While about 24% of iPhone users remain on iOS 18, applying available updates mitigates the risk.

DarkSword spyware hits iPhones simply by visiting compromised websites
technology23 days ago

DarkSword spyware hits iPhones simply by visiting compromised websites

Security researchers warn of DarkSword, a new spyware toolkit that doesn’t require installation: simply visiting an infected website can exfiltrate data from iPhones on iOS 18.4–18.7; it collects calls, contacts, messages, photos, location, iCloud content and wallet credentials, then deletes traces and leaves behind its code for reuse, with attacks seen in Saudi Arabia and Ukraine and up to hundreds of millions of devices at risk given about 25% of iPhones run iOS 18.

Apple Urges Patch: Hackers Target Old iPhones With New Tools
cybersecurity23 days ago

Apple Urges Patch: Hackers Target Old iPhones With New Tools

Security researchers say exploit kits DarkSword and Coruna, used by Russian intelligence and Chinese cybercriminals, can take over iPhones running older iOS versions via watering hole attacks; campaigns have targeted Ukrainians, Chinese crypto users, and residents of Saudi Arabia, Turkey, and Malaysia. Apple released iOS 26 and a patch for older devices to block these exploits, underscoring that keeping software up to date is the best defense against such hacks.

DarkSword exploit targets iOS 18 users via infected links
tech23 days ago

DarkSword exploit targets iOS 18 users via infected links

Security researchers have disclosed DarkSword, a six‑vulnerability exploit that can covertly steal messages, contacts, iCloud data, photos, cryptocurrency wallets and more from iPhones running iOS 18.4–18.6.2 when users visit compromised websites; up to 270 million devices could be affected. Apple patched the underlying flaws in late 2025 and blocked the malicious links, but updates remain essential as attackers use a hit‑and‑run approach and Lockdown Mode doesn’t protect all users.