Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
iPhone Exploit Toolkit Linked to U.S. Contractor Used by Russian Spies

iPhone Exploit Toolkit Linked to U.S. Contractor Used by Russian Spies

Posted on March 10, 2026 By CWS

An advanced iPhone exploit toolkit known as ‘Coruna’, originally developed for Western intelligence purposes by U.S. contractor L3Harris, has reportedly been obtained by Russian espionage agents and Chinese cybercriminals. This development raises significant concerns within the cybersecurity community.

Origins and Development of the Coruna Toolkit

The Coruna toolkit comprises 23 hacking modules specifically designed to target Apple iPhones. This sophisticated set of tools was developed by Trenchant, the hacking division of U.S. military contractor L3Harris, intended for use by the United States and its allies in the Five Eyes intelligence alliance.

The toolkit’s integrity was compromised when Peter Williams, a former general manager at Trenchant, allegedly stole eight critical components. Between 2022 and 2025, Williams sold these tools for $1.3 million to Operation Zero, a Russian entity known for dealing in exploits.

Unauthorized Distribution and Use

After acquiring the Coruna toolkit, Operation Zero reportedly redistributed the exploits to unauthorized users. This allowed a Russian espionage group identified by Google as UNC6353 to use Coruna in targeted attacks on Ukrainian iPhone users. Eventually, the toolkit made its way into the hands of Chinese cybercrime groups, who utilized it in extensive campaigns to steal financial assets, including cryptocurrency.

Technical Details and Security Implications

Coruna targets iPhone models with iOS versions ranging from 13 to 17.2.1, according to confirmations from Google and security firm iVerify. The toolkit bears a strong resemblance to the Operation Triangulation hacking campaign, which was revealed by Kaspersky in 2023.

In particular, Coruna incorporates two significant exploits: Photon and Gallium. Photon, linked to CVE-2023-32434, exploits a privilege-escalation flaw involving memory mapping, while Gallium, associated with CVE-2023-38606, targets hardware to bypass Apple’s Page Protection Layer.

The internal names of these exploits, such as Cassowary and Sparrow, mirror the naming conventions used by L3Harris, suggesting a connection. Moreover, Kaspersky’s logo for Operation Triangulation bears a resemblance to that of L3Harris, hinting at the contractor’s involvement.

The leak of these exploits underscores the dangers posed when state-level cyberweapons are exposed to criminal networks. The mechanisms by which these tools spread remain unclear, emphasizing the need for stringent cybersecurity measures.

Stay informed with the latest updates in cybersecurity by following us on Google News, LinkedIn, and X. Reach out to us if you have stories to share.

Cyber Security News Tags:Cybercrime, Cybersecurity, exploit toolkit, Five Eyes, iOS vulnerabilities, iPhone, L3Harris, Operation Zero, Russian spies, zero-day exploits

Post navigation

Previous Post: OpenAI Introduces Advanced AI Vulnerability Scanner
Next Post: LeakyLooker Flaws in Google Looker Studio Exposed

Related Posts

Phishing Scheme Exploits Dropbox to Steal User Credentials Phishing Scheme Exploits Dropbox to Steal User Credentials Cyber Security News
Shai Hulud 2.0 Compromises 1,200+ Organizations, Exposing Critical Runtime Secrets Shai Hulud 2.0 Compromises 1,200+ Organizations, Exposing Critical Runtime Secrets Cyber Security News
Critical Marimo Flaw Exploited Within Hours of Disclosure Critical Marimo Flaw Exploited Within Hours of Disclosure Cyber Security News
CyberVolk Hackers Group With New VolkLocker Payloads Attacks both Linux and Windows Systems CyberVolk Hackers Group With New VolkLocker Payloads Attacks both Linux and Windows Systems Cyber Security News
What is MCP Server – How it is Powering AI-Driven Cyber Defense What is MCP Server – How it is Powering AI-Driven Cyber Defense Cyber Security News
ZYXEL Authorization Bypass Vulnerability Let Attackers View and Download System Configuration ZYXEL Authorization Bypass Vulnerability Let Attackers View and Download System Configuration Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Windows RPC Flaw Risks System Access, Unpatched
  • AI Agents Excel in Marketplace, Reveal Key Challenges
  • OpenAI Launches Bio Bug Bounty for GPT-5.5 AI Safety
  • China’s GopherWhisper APT Exploits Legitimate Services
  • Early Cyber Weapon ‘fast16’ Revealed by Researchers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Windows RPC Flaw Risks System Access, Unpatched
  • AI Agents Excel in Marketplace, Reveal Key Challenges
  • OpenAI Launches Bio Bug Bounty for GPT-5.5 AI Safety
  • China’s GopherWhisper APT Exploits Legitimate Services
  • Early Cyber Weapon ‘fast16’ Revealed by Researchers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark