Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
DarkSword iOS Exploit Kit Targets Global iPhones

DarkSword iOS Exploit Kit Targets Global iPhones

Posted on March 18, 2026 By CWS

Security researchers have identified a new iOS exploit kit, named DarkSword, which has been actively deployed by state-sponsored hackers and commercial spyware manufacturers. This discovery highlights the ongoing threats faced by iPhone users worldwide, necessitating immediate security updates.

State-Sponsored Attacks and Commercial Exploitation

A Russian hacking group, identified as UNC6353, has been linked to the use of DarkSword in cyber attacks against Ukraine. This group is known for its previous use of the Coruna exploit kit, which targeted numerous vulnerabilities in iOS versions 13 through 17.2.1. These exploits have been primarily used in watering hole attacks, especially in the context of geopolitical tensions.

Moreover, the DarkSword kit has been used by commercial surveillance vendors, including one named UNC6748. These vendors have targeted regions like Saudi Arabia, Turkey, and Malaysia, expanding the global footprint of this exploit.

Technical Details of the DarkSword Exploit

The DarkSword exploit kit is a sophisticated tool, written completely in JavaScript, that begins its attack through Safari vulnerabilities. It achieves remote code execution by escaping browser sandboxes and exploiting kernel flaws. This process allows attackers to inject and execute further malicious payloads on the device, leading to full device compromise.

The vulnerabilities targeted by DarkSword include several critical flaws, such as CVE-2025-31277 and CVE-2025-43529, which allow attackers to manipulate memory and execute arbitrary code. Security patches for these vulnerabilities have been issued, but many devices remain at risk.

Implications for iPhone Users

Despite Apple’s efforts to patch these vulnerabilities, a significant number of iPhones remain susceptible to attacks. Researchers estimate that millions of devices running iOS versions between 18.4 and 18.6.2 are still vulnerable. Users are advised to update to the latest iOS versions, 26.3.1 and 18.7.6, to ensure their devices are protected.

In recent months, attacks utilizing DarkSword have delivered various malware payloads, including GhostBlade, GhostKnife, and GhostSaber. These payloads facilitate extensive information theft, targeting sensitive data such as passwords, messages, and even cryptocurrency wallets.

Future Outlook and Recommendations

The emergence of DarkSword underscores the evolving strategies of cybercriminals and the need for robust cybersecurity measures. Users are encouraged to remain vigilant and prioritize software updates to mitigate potential threats. The collaboration between security firms such as Google, iVerify, and Lookout is crucial in identifying and addressing these sophisticated exploits.

Ongoing research and timely updates are essential to counteract the threats posed by state-sponsored hacking groups and commercial spyware vendors. By staying informed and proactive, individuals and organizations can better protect their digital assets from future cyber threats.

Security Week News Tags:Apple patches, cyber attack, Cybersecurity, DarkSword, Google, information theft, iOS exploit, iPhone vulnerabilities, iVerify, Lookout, Malware, security researchers, Spyware, state-sponsored hacking, UNC6353

Post navigation

Previous Post: Interlock Ransomware Exploits Cisco Flaw for Root Access
Next Post: Cisco Firewall Vulnerability Used for Ransomware Attacks

Related Posts

Coyote Banking Trojan First to Abuse Microsoft UIA Coyote Banking Trojan First to Abuse Microsoft UIA Security Week News
Widespread Exploitation of XWiki Vulnerability Observed Widespread Exploitation of XWiki Vulnerability Observed Security Week News
Critical Vulnerability Exposes Many Mitel MiCollab Instances to Remote Hacking Critical Vulnerability Exposes Many Mitel MiCollab Instances to Remote Hacking Security Week News
Adobe Patches Big Batch of Critical-Severity Software Flaws Adobe Patches Big Batch of Critical-Severity Software Flaws Security Week News
DeepLoad Malware Spreads via ClickFix Attacks DeepLoad Malware Spreads via ClickFix Attacks Security Week News
Cybersecurity Updates: Satellite Protection, Chrome Flaw, Teen Arrest Cybersecurity Updates: Satellite Protection, Chrome Flaw, Teen Arrest Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Government Servers Compromised Through cPanel Vulnerability
  • Trellix Faces Security Breach in Source Code Repository
  • New Security Flaws in Exim Mail Server Demand Immediate Patch
  • Bluekit Phishing Kit Leverages AI for Advanced Features
  • Cybercriminals Exploit Google Services in Facebook Phishing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Government Servers Compromised Through cPanel Vulnerability
  • Trellix Faces Security Breach in Source Code Repository
  • New Security Flaws in Exim Mail Server Demand Immediate Patch
  • Bluekit Phishing Kit Leverages AI for Advanced Features
  • Cybercriminals Exploit Google Services in Facebook Phishing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark