Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
iPhone Exploit Toolkit Linked to U.S. Contractor Used by Russian Spies

iPhone Exploit Toolkit Linked to U.S. Contractor Used by Russian Spies

Posted on March 10, 2026 By CWS

An advanced iPhone exploit toolkit known as ‘Coruna’, originally developed for Western intelligence purposes by U.S. contractor L3Harris, has reportedly been obtained by Russian espionage agents and Chinese cybercriminals. This development raises significant concerns within the cybersecurity community.

Origins and Development of the Coruna Toolkit

The Coruna toolkit comprises 23 hacking modules specifically designed to target Apple iPhones. This sophisticated set of tools was developed by Trenchant, the hacking division of U.S. military contractor L3Harris, intended for use by the United States and its allies in the Five Eyes intelligence alliance.

The toolkit’s integrity was compromised when Peter Williams, a former general manager at Trenchant, allegedly stole eight critical components. Between 2022 and 2025, Williams sold these tools for $1.3 million to Operation Zero, a Russian entity known for dealing in exploits.

Unauthorized Distribution and Use

After acquiring the Coruna toolkit, Operation Zero reportedly redistributed the exploits to unauthorized users. This allowed a Russian espionage group identified by Google as UNC6353 to use Coruna in targeted attacks on Ukrainian iPhone users. Eventually, the toolkit made its way into the hands of Chinese cybercrime groups, who utilized it in extensive campaigns to steal financial assets, including cryptocurrency.

Technical Details and Security Implications

Coruna targets iPhone models with iOS versions ranging from 13 to 17.2.1, according to confirmations from Google and security firm iVerify. The toolkit bears a strong resemblance to the Operation Triangulation hacking campaign, which was revealed by Kaspersky in 2023.

In particular, Coruna incorporates two significant exploits: Photon and Gallium. Photon, linked to CVE-2023-32434, exploits a privilege-escalation flaw involving memory mapping, while Gallium, associated with CVE-2023-38606, targets hardware to bypass Apple’s Page Protection Layer.

The internal names of these exploits, such as Cassowary and Sparrow, mirror the naming conventions used by L3Harris, suggesting a connection. Moreover, Kaspersky’s logo for Operation Triangulation bears a resemblance to that of L3Harris, hinting at the contractor’s involvement.

The leak of these exploits underscores the dangers posed when state-level cyberweapons are exposed to criminal networks. The mechanisms by which these tools spread remain unclear, emphasizing the need for stringent cybersecurity measures.

Stay informed with the latest updates in cybersecurity by following us on Google News, LinkedIn, and X. Reach out to us if you have stories to share.

Cyber Security News Tags:Cybercrime, Cybersecurity, exploit toolkit, Five Eyes, iOS vulnerabilities, iPhone, L3Harris, Operation Zero, Russian spies, zero-day exploits

Post navigation

Previous Post: OpenAI Introduces Advanced AI Vulnerability Scanner
Next Post: LeakyLooker Flaws in Google Looker Studio Exposed

Related Posts

Threat Actors Pose as Government Officials to Attack Organizations with StallionRAT Threat Actors Pose as Government Officials to Attack Organizations with StallionRAT Cyber Security News
New WhatsApp Scam Alert Tricks Users to Get Complete Access to Your WhatsApp Chats New WhatsApp Scam Alert Tricks Users to Get Complete Access to Your WhatsApp Chats Cyber Security News
Chinese Hackers Exploit ChatGPT for Global Cyber Operations Chinese Hackers Exploit ChatGPT for Global Cyber Operations Cyber Security News
Critical Windows Vulnerability Exploit Released Critical Windows Vulnerability Exploit Released Cyber Security News
Cyber Threats Targeting Australia and New Zealand Fueled by Initial Access Sales, and Ransomware Campaigns Cyber Threats Targeting Australia and New Zealand Fueled by Initial Access Sales, and Ransomware Campaigns Cyber Security News
CISA Warns of Iranian Cyber Actors May Attack U.S. Critical Infrastructure CISA Warns of Iranian Cyber Actors May Attack U.S. Critical Infrastructure Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FortiGate Firewalls Exploited by Cyber Attackers
  • Microsoft’s March 2026 Patch Tuesday Fixes 78 Vulnerabilities
  • Jazz Secures $61M to Revolutionize AI-Powered DLP
  • Chinese Cyber Threat Targets Qatar Amid Middle East Unrest
  • SAP Addresses Critical Bugs in FS-QUO and NetWeaver

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FortiGate Firewalls Exploited by Cyber Attackers
  • Microsoft’s March 2026 Patch Tuesday Fixes 78 Vulnerabilities
  • Jazz Secures $61M to Revolutionize AI-Powered DLP
  • Chinese Cyber Threat Targets Qatar Amid Middle East Unrest
  • SAP Addresses Critical Bugs in FS-QUO and NetWeaver

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News