Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Coruna Exploit Kit Targets iOS in Global Attacks

Coruna Exploit Kit Targets iOS in Global Attacks

Posted on March 5, 2026 By CWS

Recent investigations have uncovered a sophisticated exploit kit targeting iOS devices, known as ‘Coruna’. Initially developed for state-sponsored activities, this kit has now been repurposed for widespread cyber attacks, affecting users globally.

Discovery of Coruna

Both Google Threat Intelligence Group (GTIG) and iVerify have conducted separate analyses of this iOS threat. GTIG first identified the threat in February 2025, later revealing the kit’s name as Coruna. Independently, iVerify discovered the same exploit kit, undertaking weeks of technical analysis to understand its intricacies.

The reports from both entities describe Coruna as comprising 23 exploits across five chains aimed at iOS versions 13 through 17.2.1. GTIG emphasizes the advanced nature of these exploits, employing undisclosed techniques to bypass security measures, while iVerify notes the unprecedented mass exploitation of iOS devices.

Nation-State and Criminal Use

Initially spotted in use by a commercial surveillance vendor’s client, Coruna has been deployed in attacks by UNC6353, a suspected Russian espionage group, and later by UNC6691, a Chinese financially motivated gang. This transition reflects its evolution from a surveillance tool to a mechanism for financial theft.

The exploit kit’s complexity is evident, yet it becomes ineffective against newer iOS versions. Users are advised to update to iOS 17.3 or later, or activate Lockdown Mode for enhanced security. GTIG’s analysis revealed that Coruna disengages if it detects Lockdown Mode or private browsing.

Ongoing Threat and Mitigation

Coruna’s current focus is on cryptocurrency theft, with fake websites like a mock WEEX crypto exchange enticing users to access the site via iOS devices, triggering the exploit kit. This method identifies potential crypto wallet owners and delivers the exploit kit through stealthy iFrames.

Both GTIG and iVerify continue to investigate the exploit kit, aiming to release further findings. For now, they offer the most comprehensive understanding through combined insights. The ongoing analysis emphasizes the need for vigilance and up-to-date security measures on iOS devices.

This development underscores the necessity for users to remain informed about cybersecurity threats and adopt recommended security practices to safeguard their data.

Security Week News Tags:Apple security, Coruna, cryptocurrency theft, cyber attack, Cybercrime, Cybersecurity, exploit chains, GTIG, iOS exploit, iOS vulnerabilities, iVerify, Lockdown Mode, nation-state hacking, Spyware, Surveillance

Post navigation

Previous Post: Ransomware Groups Exploit AzCopy for Data Theft
Next Post: Urgent Chrome Update Fixes Critical Security Flaws

Related Posts

Check Point to Acquire AI Security Firm Lakera Check Point to Acquire AI Security Firm Lakera Security Week News
Horizon3.ai Raises 0 Million in Series D Funding Horizon3.ai Raises $100 Million in Series D Funding Security Week News
FreeType Zero-Day Found by Meta Exploited in Paragon Spyware Attacks FreeType Zero-Day Found by Meta Exploited in Paragon Spyware Attacks Security Week News
Anubis Ransomware Packs a Wiper to Permanently Delete Files Anubis Ransomware Packs a Wiper to Permanently Delete Files Security Week News
US Announces Botnet Takedown, Charges Against Russian Administrators US Announces Botnet Takedown, Charges Against Russian Administrators Security Week News
Wide Range of Malware Delivered in React2Shell Attacks Wide Range of Malware Delivered in React2Shell Attacks Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Russian Cyber Campaign Targets Ukraine with New Malware
  • Phishing Alert Targets LastPass Users for Vault Access
  • International Operation Shuts Down LeakBase Cybercrime Forum
  • Critical Cisco Firewall Vulnerability Requires Immediate Fix
  • FBI and Europol Dismantle Cybercrime Forum LeakBase

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Russian Cyber Campaign Targets Ukraine with New Malware
  • Phishing Alert Targets LastPass Users for Vault Access
  • International Operation Shuts Down LeakBase Cybercrime Forum
  • Critical Cisco Firewall Vulnerability Requires Immediate Fix
  • FBI and Europol Dismantle Cybercrime Forum LeakBase

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News