Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Coruna Exploit Kit Threatens Thousands of iPhones

Coruna Exploit Kit Threatens Thousands of iPhones

Posted on March 4, 2026 By CWS

Google’s Threat Intelligence Group (GTIG) recently uncovered a sophisticated iOS exploit kit known as Coruna, which has compromised numerous iPhones. The Coruna kit, containing 23 vulnerabilities, affected devices running iOS versions from 13.0 to 17.2.1 throughout 2025.

Understanding the Coruna Exploit Kit

Coruna is a modular attack framework targeting various Apple iPhone models. It was discovered by GTIG when an error by a threat actor revealed the kit’s identity through a debug version. The exploit kit includes advanced components and uses non-public techniques, indicating that it might be of nation-state-level sophistication.

The kit’s documentation is extensively detailed in English, showcasing its complexity. It leverages unique exploitation methods and mitigation bypasses, making it a significant threat to iOS devices.

Tracking Coruna’s Development

Throughout 2025, GTIG observed Coruna being utilized across three distinct threat actor ecosystems. Initially, in February, it was linked to a commercial surveillance customer, employing a unique JavaScript framework to target specific iPhone models with a WebKit remote code execution exploit.

By summer, the same framework was found on compromised Ukrainian websites, used by Russian espionage group UNC6353. The exploits were delivered selectively based on geolocation. Later in the year, Chinese financial fraud group UNC6691 used the complete kit on fake financial websites aimed at iOS users.

Exploits and Mitigation Strategies

The Coruna kit includes five full exploit chains involving WebKit RCE, PAC bypasses, and more. Notable vulnerabilities targeted include CVEs like CVE-2021-30952 and CVE-2023-43000. Two exploits, Photon and Gallium, were previously used in a 2023 iOS espionage campaign.

A payload called PlasmaLoader is deployed at the end of the exploit chain, targeting cryptocurrency wallet apps and scanning Apple Notes for sensitive information. The code is written in Chinese, suggesting involvement of Chinese developers. Communication is encrypted, with fallback .xyz domains generated via a Domain Generation Algorithm.

GTIG has blocked related domains on Google Safe Browsing. Users are advised to update to the latest iOS version, enable Lockdown Mode if unable to update, and avoid suspicious financial sites. Monitoring for unusual network requests can help detect potential threats.

For ongoing cybersecurity updates, follow us on Google News, LinkedIn, and X, and contact us if you have stories to share.

Cyber Security News Tags:Chinese hackers, Coruna exploit, cryptocurrency theft, Cybersecurity, exploit kit, financial fraud, Google Threat Intelligence, iOS update, iOS vulnerability, iPhone security, mobile security, PAC bypass, phishing threats, Russian espionage, WebKit RCE

Post navigation

Previous Post: StegaBin Campaign Exploits npm with Credential Stealer
Next Post: Windows 11 Upgrade Issues Disrupt Network Access

Related Posts

Cybersecurity Newsletter Weekly – Discord, Red Hat Data Breach, 7-Zip Vulnerabilities and Sonicwall Firewall Hack Cybersecurity Newsletter Weekly – Discord, Red Hat Data Breach, 7-Zip Vulnerabilities and Sonicwall Firewall Hack Cyber Security News
Threat Actors with Fake Job Lures Attacking Job Seekers to Deploy Advanced Malware Threat Actors with Fake Job Lures Attacking Job Seekers to Deploy Advanced Malware Cyber Security News
Hackers Actively Exploiting AI Deployments Hackers Actively Exploiting AI Deployments Cyber Security News
Defy Security Appoints Esteemed Cybersecurity Leader Gary Warzala to Its Board of Directors Defy Security Appoints Esteemed Cybersecurity Leader Gary Warzala to Its Board of Directors Cyber Security News
Google Unveils new AI-Protection for Android to Keep You Safe From Mobile Scams Google Unveils new AI-Protection for Android to Keep You Safe From Mobile Scams Cyber Security News
Windows 11 to Integrate Sysmon for Enhanced Security Windows 11 to Integrate Sysmon for Enhanced Security Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CISA Flags VMware Vulnerability Amid Active Exploits
  • Windows 11 Upgrade Issues Disrupt Network Access
  • Coruna Exploit Kit Threatens Thousands of iPhones
  • StegaBin Campaign Exploits npm with Credential Stealer
  • Archipelo and Checkmarx Forge AppSec Alliance

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CISA Flags VMware Vulnerability Amid Active Exploits
  • Windows 11 Upgrade Issues Disrupt Network Access
  • Coruna Exploit Kit Threatens Thousands of iPhones
  • StegaBin Campaign Exploits npm with Credential Stealer
  • Archipelo and Checkmarx Forge AppSec Alliance

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News